{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T05:10:08Z","timestamp":1746162608194,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_71","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"690-695","source":"Crossref","is-referenced-by-count":1,"title":["An Effective Cloud-Based Active Defense System against Malicious Codes"],"prefix":"10.1007","author":[{"given":"Zhenyu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wujun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"71_CR1","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez, C.A., Echeverri, G.I., Sanz, A.G.C.: Malware detection based on cloud computing integrating intrusion ontology representation. In: IEEE Latin-American Conference on Communications (LATINCOM), Bogota, pp. 1\u20136 (2010)","DOI":"10.1109\/LATINCOM.2010.5641013"},{"key":"71_CR2","unstructured":"Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: Proc. of the 17th USENIX Security Symposium, San Jose, Calofornia, USA, pp. 91\u2013106 (2008)"},{"issue":"4","key":"71_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M. Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R.: A view of cloud computing. Communications of the ACM\u00a053(4), 50\u201358 (2010)","journal-title":"Communications of the ACM"},{"key":"71_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/11856214_9","volume-title":"Recent Advances in Intrusion Detection","author":"P. Baecher","year":"2006","unstructured":"Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 165\u2013184. Springer, Heidelberg (2006)"},{"key":"71_CR5","unstructured":"Niels, P.: A Virtual Honeypot Framework. In: Proceedings of 13th USENIX Security Symposium, San Diego, CA, USA, pp. 1\u201314 (2004)"},{"key":"71_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/IAW.2005.1495929","volume-title":"Proceedings from the Sixth Annual IEEE SMC, Information Assurance Workshop","author":"E. Balas","year":"2005","unstructured":"Balas, E., Viecco, C.: Towards a third generation data capture architecture for honeynets. In: Proceedings from the Sixth Annual IEEE SMC, Information Assurance Workshop, pp. 21\u201328. IEEE, NY (2005)"},{"key":"71_CR7","doi-asserted-by":"crossref","unstructured":"Wright, W., Schroh, D., Proulx, P.: The sandbox for analysis: concepts and Eevaluation. In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Quebec, Canada, pp. 801\u2013810 (2006)","DOI":"10.1145\/1124772.1124890"},{"issue":"2","key":"71_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2007.45","volume":"5","author":"C. Willems","year":"2007","unstructured":"Willems, C., Holz, T., Freiling, F.: Toward Automated Dynamic Malware Analysis Using CWSandbox. Security & Privacy\u00a05(2), 32\u201339 (2007)","journal-title":"Security & Privacy"},{"key":"71_CR9","doi-asserted-by":"crossref","unstructured":"Vrable, M., Ma, J., Chen, J.: Scalability, fidelity, and containment in the potemkin virtual honeyfarm. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, SOSP, Brighton, UK, pp. 148\u2013162 (2005)","DOI":"10.1145\/1095810.1095825"},{"issue":"4","key":"71_CR10","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.cose.2006.02.009","volume":"25","author":"H. Artail","year":"2006","unstructured":"Artail, H., Safa, H., Sraj, M.: A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Computers & Security\u00a025(4), 274\u2013288 (2006)","journal-title":"Computers & Security"},{"key":"71_CR11","unstructured":"Bailey, M., Cooke, E., Watson, D.: A hybrid honeypot architecture for scalable network monitoring. Technical Report CSE-TR-499-04, U. Michigan (2004)"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Peter, G.B., Robin, E.B., Ilir, G., Vladimir, S.: Diversity for Security: A Study with Off-the-Shelf AntiVirus Engines. In: IEEE 22nd International Symposium on Software Reliability Engineering, ISSRE 2011, Hiroshima, Japan, pp. 11\u201319 (2011)","DOI":"10.1109\/ISSRE.2011.15"},{"key":"71_CR13","doi-asserted-by":"crossref","unstructured":"Xu, J., Yan, J., He, L., Su, P., Feng, D.: CloudSEC: A Cloud Architecture for Composing Collaborative Security Services. In: Proceedings of the Second International Conference on Cloud Computing, CloudCom 2010, Indianapolis, Indiana, USA, November 30-December 3, pp. 703\u2013711 (2010)","DOI":"10.1109\/CloudCom.2010.16"},{"key":"71_CR14","unstructured":"Giorgos, V., Michalis, P., Sotiris, I.: MIDeA: a multi-parallel intrusion detection architecture. In: Proceedings of the 18th ACM Conference on Computer and Communication Security, CCS, Chicago, Illinois, USA, pp. 297\u2013308 (2011)"},{"key":"71_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-15512-3_5","volume-title":"Recent Advances in Intrusion Detection","author":"G. Vasiliadis","year":"2010","unstructured":"Vasiliadis, G., Ioannidis, S.: GrAVity: A Massively Parallel Antivirus Engine. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 79\u201396. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_71","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:29:46Z","timestamp":1746160186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_71"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_71","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}