{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:23:19Z","timestamp":1743045799051,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662452363"},{"type":"electronic","value":"9783662452370"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45237-0_62","type":"book-chapter","created":{"date-parts":[[2014,10,25]],"date-time":"2014-10-25T10:37:20Z","timestamp":1414233440000},"page":"688-700","source":"Crossref","is-referenced-by-count":2,"title":["Semantic Set Analysis for Malware Detection"],"prefix":"10.1007","author":[{"given":"Nguyen","family":"Van Nhuong","sequence":"first","affiliation":[]},{"given":"Vo Thi Yen","family":"Nhi","sequence":"additional","affiliation":[]},{"given":"Nguyen Tan","family":"Cam","sequence":"additional","affiliation":[]},{"given":"Mai Xuan","family":"Phu","sequence":"additional","affiliation":[]},{"given":"Cao Dang","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","unstructured":"Infographic: The State of Malware, McAfee Security (2013), \n                    \n                      http:\/\/www.mcafee.com\/us\/security-awareness\/articles\/state-of-malware-2013.aspx"},{"key":"62_CR2","unstructured":"Rad, B.B., Masrom, M., Ibrahim, S.: Camouflage in Malware: From Encryption to Metamorphism. International Journal of Computer Science & Network Security (2012)"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"Nguyen, A.M., Schear, N., Jung, H., Godiyal, A., King, S.T., Nguyen, H.D.: MAVMM: Lightweight and purpose built VMM for malware analysis. In: Computer Security Applications Conference (2009)","DOI":"10.1109\/ACSAC.2009.48"},{"key":"62_CR4","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-22786-8_6","volume-title":"Computer Networks and Intelligent Computing","author":"S. Jain","year":"2011","unstructured":"Jain, S., Meena, Y.K.: Byte Level n\u2013Gram Analysis for Malware Detection. In: Venugopal, K.R., Patnaik, L.M. (eds.) ICIP 2011. CCIS, vol.\u00a0157, pp. 51\u201359. Springer, Heidelberg (2011)"},{"key":"62_CR5","unstructured":"Ghiasi, M., Sami, A., Salehi, Z.: DyVSoR: Dynamic Malware Detection Based on Extracting Patterns fromValue Sets of Registers. The ISC International Journal of Information Security (2013)"},{"key":"62_CR6","unstructured":"Alazab, M., Layton, R., Venkataraman, S., Watters, P.: Malware detection based on structural and behavioural features of API calls. In: The Proceedings of the 1st International Cyber Resilience Conference (2010)"},{"key":"62_CR7","unstructured":"Elhadi, A.A.E., Maarof, M.A., Osman, A.H.: Malware Detection Based on Hybrid Signature Behavior Application Programming Interface Call Graph. American Journal of Applied Sciences (2012)"},{"key":"62_CR8","unstructured":"Pyew Python tool, \n                    \n                      https:\/\/code.google.com\/p\/pyew\/"},{"key":"62_CR9","unstructured":"Virus heavens Snapshot, \n                    \n                      https:\/\/archive.org\/details\/vxheavens-2010-05-18"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45237-0_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T05:42:06Z","timestamp":1559022126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45237-0_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662452363","9783662452370"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45237-0_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}