{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:34:11Z","timestamp":1725888851093},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319597669"},{"type":"electronic","value":"9783319597676"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59767-6_12","type":"book-chapter","created":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T23:44:19Z","timestamp":1496015059000},"page":"144-153","source":"Crossref","is-referenced-by-count":0,"title":["The Possibilities of System\u2019s Self-defense Against Malicious Software"],"prefix":"10.1007","author":[{"given":"Miros\u0142aw","family":"Skrzewski","sequence":"first","affiliation":[]},{"given":"Pawe\u0142","family":"Rybka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,30]]},"reference":[{"key":"12_CR1","unstructured":"Dasgupta, D.: Immuno-inspired Autonomic System for Cyber Defense. \nhttp:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.372.1644&rep=rep.1&type=pdf"},{"key":"12_CR2","unstructured":"Sterritt, R., Hinchey, M.: Biologically-Inspired Concepts for Autonomic Self-protection in Multi-agent Systems. \nhttp:\/\/uir.ulster.ac.uk\/2579\/1\/sasemas-sterritt-hinchey-book-finalv3.pdf"},{"key":"12_CR3","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/TPDS.2011.161","volume":"23","author":"D Hagimont","year":"2012","unstructured":"Hagimont, D., Boyer, F., Broto, L., De Palma, N.: Self-protection in a clustered distributed system. IEEE Trans. Parallel Distrib. Syst. 23, 330\u2013336 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"12_CR4","unstructured":"Riden, J., Seifert, C.: A Guide to Different Kinds of Honeypots. \nhttps:\/\/www.symantec.com\/connect\/articles\/guide-different-kinds-honeypots"},{"key":"12_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-319-39207-3_11","volume-title":"Computer Networks","author":"T Sochor","year":"2016","unstructured":"Sochor, T., Zuzcak, M.: High-interaction linux honeypot architecture in recent perspective. In: Gaj, P., Kwiecie\u0144, A., Stera, P. (eds.) CN 2016. CCIS, vol. 608, pp. 118\u2013131. Springer, Cham (2016). doi:\n10.1007\/978-3-319-39207-3_11"},{"key":"12_CR6","unstructured":"Zeltser, L.: Specialized Honeypots for SSH, Web and Malware Attacks. \nhttps:\/\/zeltser.com\/honeypots-for-malware-ssh-web-attacks\/"},{"key":"12_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-21771-5_29","volume-title":"Computer Networks","author":"M Skrzewski","year":"2011","unstructured":"Skrzewski, M.: Flow based algorithm for malware traffic detection. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2011. CCIS, vol. 160, pp. 271\u2013280. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-21771-5_29"},{"key":"12_CR8","unstructured":"Shevchenko, A.: The evolution of self-defense technologies in malware. \nhttps:\/\/securelist.com\/analysis\/publications\/36156\/the-evolution-of-self-defense-technologies-in-malware\/"},{"key":"12_CR9","doi-asserted-by":"crossref","first-page":"1350070","DOI":"10.1142\/S0218126613500709","volume":"22","author":"R Cupek","year":"2013","unstructured":"Cupek, R., Ziebinski, A., Franek, M.: FPGA based OPC UA embedded industrial data server implementation. J. Circ. Syst. Comput. 22, 1350070 (2013)","journal-title":"J. Circ. Syst. Comput."},{"key":"12_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-19419-6_7","volume-title":"Computer Networks","author":"T Sochor","year":"2015","unstructured":"Sochor, T., Zuzcak, M.: Attractiveness study of honeypots and honeynets in internet threat detection. In: Gaj, P., Kwiecie\u0144, A., Stera, P. (eds.) CN 2015. CCIS, vol. 522, pp. 69\u201381. Springer, Cham (2015). doi:\n10.1007\/978-3-319-19419-6_7"},{"key":"12_CR11","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-07941-7_14","volume-title":"Computer Networks","author":"M Skrzewski","year":"2014","unstructured":"Skrzewski, M.: System network activity monitoring for malware threats detection. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 138\u2013146. Springer, Cham (2014). doi:\n10.1007\/978-3-319-07941-7_14"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-45246-3_13","volume-title":"Computational Collective Intelligence","author":"A Ziebinski","year":"2016","unstructured":"Ziebinski, A., Cupek, R., Erdogan, H., Waechter, S.: A survey of ADAS technologies for the future perspective of sensor fusion. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawi\u0144ski, B. (eds.) ICCCI 2016. LNCS, vol. 9876, pp. 135\u2013146. Springer, Cham (2016). doi:\n10.1007\/978-3-319-45246-3_13"},{"key":"12_CR13","unstructured":"ARGUS- Auditing Network Activity. \nhttp:\/\/qosient.com\/argus\/"},{"key":"12_CR14","unstructured":"Capture BAT. \nhttps:\/\/www.honeynet.org\/project\/CaptureBAT"},{"key":"12_CR15","unstructured":"Dionaea capture malware. \nhttp:\/\/dionaea.carnivore.it\/"},{"key":"12_CR16","unstructured":"https:\/\/www.honeynet.org\/project"},{"key":"12_CR17","unstructured":"Etherape, a graphical network monitor. \nhttp:\/\/etherape.sourceforge.net\/"},{"key":"12_CR18","unstructured":"Regshot. \nhttps:\/\/sourceforge.net\/projects\/regshot\/files\/regshot\/"},{"key":"12_CR19","unstructured":"Windows Sysinternals. \nhttps:\/\/technet.microsoft.com\/en-us\/sysinternals"},{"key":"12_CR20","unstructured":"AFICK (Another File Integrity ChecKer). \nhttp:\/\/afick.sourceforge.net\/"},{"key":"12_CR21","unstructured":"GNU utilities for Win32. \nhttp:\/\/unxutils.sourceforge.net\/"},{"key":"12_CR22","unstructured":"GitHub ytisf\/theZoo repository. \nhttps:\/\/github.com\/ytisf\/theZoo\/tree\/master\/malwares\/Binaries"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59767-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T23:48:43Z","timestamp":1496015323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59767-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319597669","9783319597676"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59767-6_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}