{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:46:12Z","timestamp":1773409572021,"version":"3.50.1"},"publisher-location":"New Delhi","reference-count":12,"publisher":"Springer India","isbn-type":[{"value":"9788132204909","type":"print"},{"value":"9788132204916","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-81-322-0491-6_30","type":"book-chapter","created":{"date-parts":[[2012,4,12]],"date-time":"2012-04-12T04:55:10Z","timestamp":1334206510000},"page":"305-315","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Soumyadeep G.","family":"Dastidar","sequence":"first","affiliation":[]},{"given":"Subhrangsu","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"Ferdous A.","family":"Barbhuiya","sequence":"additional","affiliation":[]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional (2005)"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Kephart, J., William, A.: Automatic extraction of computer virus signatures. In: Proceedings of the 4th International Virus Bulletin Conference, pp. 178\u2013184 (1994)","DOI":"10.1016\/0142-0496(94)90045-0"},{"key":"30_CR3","unstructured":"Wong, W.: Analysis and detection of metamorphic computer viruses. Master\u2019s thesis, San Jose State University (2006)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Feng, M., Gupta, R.: Detecting virus mutations via dynamic matching. In: IEEE International Conference on Software Maintenance, pp. 105\u2013114 (2009)","DOI":"10.1109\/ICSM.2009.5306329"},{"key":"30_CR5","unstructured":"Schultz, M., Eskin, E., Zadok, E., Stolfo, S.: Data mining methods for detection of new malicious executables. In: IEEE Symposium on Security and Privacy, p. 0038 (2001)"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/64.511768","volume":"11","author":"G. Tesauro","year":"1996","unstructured":"Tesauro, G., Kephart, J., Sorkin, G.: Neural networks for computer virus recognition. IEEE Expert\u00a011, 5\u20136 (1996)","journal-title":"IEEE Expert"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L. Rabiner","year":"1989","unstructured":"Rabiner, L.: A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE\u00a077, 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"30_CR8","unstructured":"Attaluri, S.: Detecting metamorphic viruses using profile hidden markov models. Master\u2019s thesis, San Jose State University (2007)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Kim, D.H., Lee, T., Jung, S.-O.D., In, H.P., Lee, H.J.: Cyber threat trend analysis model using hmm. In: Third International Symposium on Information Assurance and Security, pp. 177\u2013182 (2007)","DOI":"10.1109\/IAS.2007.19"},{"key":"30_CR10","unstructured":"Govindaraj, S.: Practical detection of metamorphic computer viruses. San Jose State University. Tech. Rep. (2008)"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Dempster, P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. Royal Statistical Society, 1\u201338 (1977)","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"30_CR12","unstructured":"Sivanandam, S.N., Deepa, S.N.: Introduction to Genetic Algorithm. Springer (2008)"}],"container-title":["Advances in Intelligent and Soft Computing","Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-0491-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T04:21:14Z","timestamp":1557980474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-0491-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9788132204909","9788132204916"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-0491-6_30","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"value":"1867-5662","type":"print"},{"value":"1867-5670","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}