{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:36:14Z","timestamp":1743150974488,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_60","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T14:37:20Z","timestamp":1414247840000},"page":"667-679","source":"Crossref","is-referenced-by-count":8,"title":["Malware Behavior Modeling with Colored Petri Nets"],"prefix":"10.1007","author":[{"given":"Bartosz","family":"Jasiul","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Szpyrka","sequence":"additional","affiliation":[]},{"given":"Joanna","family":"\u015aliwa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/3-540-61996-8_49","volume-title":"Information Hiding","author":"D. Aucsmith","year":"1996","unstructured":"Aucsmith, D.: Tamper\u2013resistant software: An implementation. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 317\u2013333. Springer, Heidelberg (1996)"},{"key":"60_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","volume-title":"Recent Advances in Intrusion Detection","author":"M. Bailey","year":"2007","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.\u00a04637, pp. 178\u2013197. Springer, Heidelberg (2007)"},{"key":"60_CR3","series-title":"LNCS","first-page":"473","volume-title":"CISIM 2014","author":"P. Berezi\u0144ski","year":"2014","unstructured":"Berezi\u0144ski, P., Szpyrka, M., Jasiul, B., Mazur, M.: Network anomaly detection using parameterized entropy. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol.\u00a08838, pp. 473\u2013486. Springer, Heidelberg (2014)"},{"key":"60_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-73001-9_8","volume-title":"Computation and Logic in the Real World","author":"G. Bonfante","year":"2007","unstructured":"Bonfante, G., Kaczmarek, M., Marion, J.-Y.: A classification of viruses through recursion theorems. In: Cooper, S.B., L\u00f6we, B., Sorbi, A. (eds.) CiE 2007. LNCS, vol.\u00a04497, pp. 73\u201382. Springer, Heidelberg (2007)"},{"issue":"3","key":"60_CR5","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-008-0084-2","volume":"4","author":"J.M. Borello","year":"2008","unstructured":"Borello, J.M., M\u00e9, L.: Code obfuscation techniques for metamorphic viruses. Journal in Computer Virology\u00a04(3), 211\u2013220 (2008), doi:10.1007\/s11416-008-0084-2","journal-title":"Journal in Computer Virology"},{"key":"60_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-540-79104-1_7","volume-title":"Information Security Practice and Experience","author":"J. Cappaert","year":"2008","unstructured":"Cappaert, J., Preneel, B., Anckaert, B., Madou, M., De Bosschere, K.: Towards tamper resistant code encryption: practice and experience. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 86\u2013100. Springer, Heidelberg (2008)"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Kruegel, C.: Mining specifications of malicious behavior. In: Proc. of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Int. Symposium on Foundations of Software Engineering, pp. 5\u201314 (2007)","DOI":"10.1145\/1287624.1287628"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy, pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"60_CR9","unstructured":"Flake, H.: Structural comparison of executable objects. In: Proc. of the IEEE Conference on Detection of Intrusions and Malware & Vulnerability Assessment, pp. 161\u2013173 (2004)"},{"key":"60_CR10","unstructured":"Healy, L.: A model to study cyber attack mechanics and denial-of-service exploits over the internet\u2019s router infrastructure using Colored Petri Nets. Tech. rep. Masters Theses and Doctoral Dissertations (2009), http:\/\/commons.emich.edu\/theses\/218"},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Jasiul, B., \u015aliwa, J., Gleba, K., Szpyrka, M.: Identification of malware activities with rules. In: Proceedings of the Federated Conference on Computer Science and Information Systems, Warsaw, Poland (2014)","DOI":"10.15439\/2014F265"},{"key":"60_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/b95112","volume-title":"Coloured Petri Nets: Modelling and Validation of Concurrent Systems","author":"K. Jensen","year":"2009","unstructured":"Jensen, K., Kristensen, L.: Coloured Petri Nets: Modelling and Validation of Concurrent Systems, 1st edn. Springer, Heidelberg (2009)","edition":"1"},{"key":"60_CR13","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11416-005-0002-9","volume":"1","author":"M. Karim","year":"2005","unstructured":"Karim, M., Walenstein, A., Lakhotia, A., Parida, L.: Malware phylogeny generation using permutations of code. Journal in Computer Virology\u00a01, 13\u201323 (2005)","journal-title":"Journal in Computer Virology"},{"key":"60_CR14","unstructured":"Kirda, E., Kruegel, C., Banks, G., Vigna, G., Kemmerer, R.: Behavior-based spyware detection. In: Usenix Security Symposium (2006)"},{"key":"60_CR15","first-page":"2721","volume":"7","author":"J. Kolter","year":"2006","unstructured":"Kolter, J., Maloof, M.: Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research\u00a07, 2721\u20132744 (2006)","journal-title":"Journal of Machine Learning Research"},{"key":"60_CR16","unstructured":"Kruegel, C., Robertson, W., Vigna, G.: Detecting kernel-level rootkits through binary analysis. In: Proceedings of the Annual Computer Security Applications Conference (2004)"},{"key":"60_CR17","unstructured":"Kumar, S., Spafford, E.: A Pattern Matching Model for Misuse Intrusion Detection. Tech. rep., Computer Science Technical Reports (1994) http:\/\/docs.lib.purdue.edu\/cstech\/1170"},{"key":"60_CR18","unstructured":"Lee, T., Mody, J.: Behavioral classification. In: Proceedings of EICAR Conference (2006)"},{"key":"60_CR19","doi-asserted-by":"crossref","unstructured":"Linn, C., Debray, S.: Obfuscation of executable code to improve resistance to static disassembly. In: Proceedings of the 10th ACM Conf. on Computer and Communications Security, pp. 290\u2013299. ACM (2003)","DOI":"10.1145\/948109.948149"},{"key":"60_CR20","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Proceedings of the Annual Computer Security Applications Conference (2007)","DOI":"10.1109\/ACSAC.2007.4413008"},{"issue":"1","key":"60_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.2298\/CSIS130209002N","volume":"11","author":"G. Nalepa","year":"2014","unstructured":"Nalepa, G., Bobek, S.: Rule-based solution for context-aware reasoning on mobile devices. Computer Science and Information Systems\u00a011(1), 171\u2013193 (2014)","journal-title":"Computer Science and Information Systems"},{"key":"60_CR22","doi-asserted-by":"crossref","unstructured":"Nalepa, G., Lig\u0119za, A.: Designing reliable Web security systems using rule-based systems approach. In: Menasalvas, E., Segovia, J., Szczepaniak, P.S. (eds.) AWIC 2003. LNCS (LNAI), vol.\u00a02663, pp. 124\u2013133. Springer, Heidelberg (2003)","DOI":"10.1007\/3-540-44831-4_14"},{"key":"60_CR23","first-page":"74","volume":"12","author":"B. Rad","year":"2012","unstructured":"Rad, B., Masrom, M., Ibrahim, S.: Camouflage in malware: From encryption to metamorphism. Int. Journal of Computer Science and Network Security\u00a012, 74\u201383 (2012)","journal-title":"Int. Journal of Computer Science and Network Security"},{"key":"60_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-70542-0_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"K. Rieck","year":"2008","unstructured":"Rieck, K., Holz, T., Willems, C., D\u00fcssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.\u00a05137, pp. 108\u2013125. Springer, Heidelberg (2008)"},{"key":"60_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-540-88313-5_31","volume-title":"Computer Security - ESORICS 2008","author":"M. Sharif","year":"2008","unstructured":"Sharif, M., Yegneswaran, V., Saidi, H., Porras, P.A., Lee, W.: Eureka: A framework for enabling static malware analysis. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 481\u2013500. Springer, Heidelberg (2008)"},{"key":"60_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/978-3-642-23935-9_59","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"J. Sliwa","year":"2011","unstructured":"Sliwa, J., Gleba, K., Chmiel, W., Szwed, P., Glowacz, A.: IOEM \u2013 Ontology engineering methodology for large systems. In: J\u0119drzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol.\u00a06922, pp. 602\u2013611. Springer, Heidelberg (2011)"},{"key":"60_CR27","doi-asserted-by":"crossref","unstructured":"\u015aliwa, J., Jasiul, B.: Efficiency of dynamic content adaptation based on semantic description of web service call context. In: Proceedings - IEEE Military Communications Conference MILCOM 2012, Orlando, USA, pp. 1\u20136 (2012), doi:10.1109\/MILCOM.2012.6415810","DOI":"10.1109\/MILCOM.2012.6415810"},{"key":"60_CR28","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison\u2013Wesley Professional. Symantec Press series (2005)"},{"key":"60_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-40925-7_26","volume-title":"Computer Information Systems and Industrial Management","author":"M. Szpyrka","year":"2013","unstructured":"Szpyrka, M., Jasiul, B., Wrona, K., Dziedzic, F.: Telecommunications networks risk assessment with Bayesian networks. In: Saeed, K., Chaki, R., Cortesi, A., Wierzcho\u0144, S. (eds.) CISIM 2013. LNCS, vol.\u00a08104, pp. 277\u2013288. Springer, Heidelberg (2013)"},{"key":"60_CR30","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1007\/978-3-540-73451-2_68","volume-title":"Rough Sets and Intelligent Systems Paradigms","author":"M. Szpyrka","year":"2007","unstructured":"Szpyrka, M., Szmuc, T.: Decision tables in Petri net models. In: Kryszkiewicz, M., Peters, J.F., Rybi\u0144ski, H., Skowron, A. (eds.) RSEISP 2007. LNCS (LNAI), vol.\u00a04585, pp. 648\u2013657. Springer, Heidelberg (2007)"},{"issue":"1","key":"60_CR31","doi-asserted-by":"publisher","first-page":"213","DOI":"10.2478\/amcs-2014-0016","volume":"24","author":"P. Szwed","year":"2014","unstructured":"Szwed, P., Skrzy\u0144ski, P.: A new lightweight method for security risk assessment based on fuzzy cognitive maps. International Journal of Applied Mathematics and Computer Science\u00a024(1), 213\u2013225 (2014)","journal-title":"International Journal of Applied Mathematics and Computer Science"},{"key":"60_CR32","doi-asserted-by":"crossref","unstructured":"Tarapata, Z., Chmielewski, M., Kasprzyk, R.: An algorithmic approach to social knowledge processing and reasoning based on graph representation: A case study. In: Nguyen, N.T., Le, M.T., \u015awi\u0105tek, J. (eds.) ACIIDS 2010. Part II. LNCS (LNAI), vol.\u00a05991, pp. 93\u2013104. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-12101-2_11"},{"key":"60_CR33","doi-asserted-by":"crossref","unstructured":"Tokhtabayev, A., Skormin, V., Dolgikh, A.: Dynamic, resilient detection of complex malicious functionalities in the system call domain. In: MILCOM, Military Communications Conference, pp. 1349\u20131356 (2010), doi:10.1109\/MILCOM.2010.5680136","DOI":"10.1109\/MILCOM.2010.5680136"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T04:15:42Z","timestamp":1598415342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}