{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:11:20Z","timestamp":1742976680453,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":8,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132216643"},{"type":"electronic","value":"9788132216650"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1665-0_63","type":"book-chapter","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T10:47:18Z","timestamp":1387277238000},"page":"637-643","source":"Crossref","is-referenced-by-count":1,"title":["An Overview of Detection Techniques for Metamorphic Malware"],"prefix":"10.1007","author":[{"given":"Pratiksha","family":"Natani","sequence":"first","affiliation":[]},{"given":"Deepti","family":"Vidyarthi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","unstructured":"Eilam, E.: Reversing Secrets of Reverse Engineering. Wiley Publishing, Inc., (2005)"},{"key":"63_CR2","unstructured":"Sridhara, S.M.: Metamorphic worm that carries its own morphing engine. Master\u2019s Projects, San Jose State University (2006)"},{"key":"63_CR3","doi-asserted-by":"crossref","unstructured":"Chouchane, M.R., Lakhotia, A.: Using engine signature to detect metamorphic malware. In WORM \u201806: Proceedings of the 4th ACM workshop on Recurring Malcode, ACM Press (2006)","DOI":"10.1145\/1179542.1179558"},{"issue":"3","key":"63_CR4","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11416-006-0028-7","volume":"2","author":"W Wong","year":"2006","unstructured":"Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211\u2013229 (2006)","journal-title":"J. Comput. Virol."},{"key":"63_CR5","unstructured":"Lin, D.: Hunting for undetectable metamorphic viruses. Master\u2019s Projects, San Jose State University (2009)"},{"key":"63_CR6","unstructured":"Finones, R.G., Fernandez, R.: Solving the metamorphic puzzle. In: Virus Bulletin, March 2006, pp. 14\u201319"},{"issue":"1\u20132","key":"63_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s11416-012-0160-5","volume":"8","author":"N Runwal","year":"2012","unstructured":"Runwal, N., Low, R.M., Stamp, M.: Opcode graph similarity and metamorphic detection. J. Comput. Virol. 8(1\u20132), 37\u201352 (2012)","journal-title":"J. Comput. Virol."},{"key":"63_CR8","unstructured":"Szor, P., Ferrie, P.: Hunting for Metamorphic. Available: https:\/\/www.symantec.com\/avcenter\/reference\/hunting.for.metamorphic.pdf. Last Accessed 12 Aug 2012"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing, Networking, and Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1665-0_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T10:17:24Z","timestamp":1605608244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-1665-0_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132216643","9788132216650"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1665-0_63","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}