{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:25Z","timestamp":1725518785188},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881919"},{"type":"electronic","value":"9783540881926"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88192-6_24","type":"book-chapter","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T08:05:59Z","timestamp":1222675559000},"page":"250-259","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Immune Based Approach for Detection of Windows PE Virus"],"prefix":"10.1007","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Renchao","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1126\/science.1140909","volume":"317","author":"R. Ford","year":"2007","unstructured":"Ford, R., Spafford, E.H.: Happy Birthday, Dear Viruses. Science\u00a0317, 210\u2013211 (2007)","journal-title":"Science"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1126\/science.1095845","volume":"304","author":"J. Balthrop","year":"2004","unstructured":"Balthrop, J., Forrest, S., Newman, M.E.J., et al.: Technological networks and the spread of computer viruses. Science\u00a0304, 527\u2013529 (2004)","journal-title":"Science"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Xu, J.Y., Sung, A.H., Chavez, P.: Polymorphic malicious executable scanner by API sequence analysis. In: Fourth International Conference on Hybrid Intelligent Systems, pp. 378\u2013383 (2004)","DOI":"10.1109\/ICHIS.2004.75"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11416-006-0027-8","volume":"2","author":"D.K.S. Reddy","year":"2006","unstructured":"Reddy, D.K.S., Pujari, A.K.: N-gram analysis for computer virus detection. Journal in Computer Virology\u00a02, 231\u2013239 (2006)","journal-title":"Journal in Computer Virology"},{"issue":"4","key":"24_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/64.511768","volume":"11","author":"G.J. Tesauro","year":"1996","unstructured":"Tesauro, G.J., Kephart, J.O., Sorkin, G.B.: Neural networks for computer virus recognition. IEEE Expert\u00a011(4), 5\u20136 (1996)","journal-title":"IEEE Expert"},{"issue":"10","key":"24_CR6","first-page":"18","volume":"32","author":"Z. Boyun","year":"2006","unstructured":"Boyun, Z., Jianping, Y., Jingbo, G., Dingxing, Z.: Unknown Computer Virus Detection Based on Multi-naive Bayes Algorithm. Computer Engineering\u00a032(10), 18\u201321 (2006)","journal-title":"Computer Engineering"},{"issue":"8","key":"24_CR7","first-page":"1942","volume":"27","author":"W. Shuo","year":"2007","unstructured":"Shuo, W., Ji-liu, Z., Bo, P.: Unknown virus detection based on API sequence and support vector machine. Journal of Computer Applications\u00a027(8), 1942\u20131943 (2007)","journal-title":"Journal of Computer Applications"},{"issue":"6","key":"24_CR8","first-page":"7","volume":"41","author":"Z. Boyun","year":"2005","unstructured":"Boyun, Z., Jianping, Y., Dingxing, Z., Jingbo, H.: Unknown Computer Virus Detection Based on K-Nearest Neighbor Algorithm. Computer Engineering and Applications\u00a041(6), 7\u201310 (2005)","journal-title":"Computer Engineering and Applications"},{"issue":"2","key":"24_CR9","first-page":"61","volume":"19","author":"C. Yueling","year":"2006","unstructured":"Yueling, C., Xiaozhu, J.: Computer Viruses Detection Method Based on Program Behavior. Journal of Qingdao University (Natural Science Edition)\u00a019(2), 61\u201365 (2006)","journal-title":"Journal of Qingdao University (Natural Science Edition)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Schultz, M.G., Eskin, E., Zadok, E.: Data Mining Methods for Detection of New Malicious Executables. In: IEEE Symposium on Security and Privacy (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"24_CR11","unstructured":"Guojpeng\/CVC.GB.: The analysis of Win32 PE viruses (2003), \n                    \n                      http:\/\/www.hynubbs.cn\/netstar\/news_view.asp?id=61"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A.S.: Self-nonself discrimination in a computer. In: IEEE Symposium on Security and Privacy, pp. 202\u2013213 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"24_CR13","unstructured":"VX Heavens, \n                    \n                      http:\/\/vx.netlux.org"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88192-6_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:57:43Z","timestamp":1619524663000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88192-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881919","9783540881926"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88192-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}