{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:16:22Z","timestamp":1732036582718},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_48","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"485-495","source":"Crossref","is-referenced-by-count":3,"title":["Cloud Based Malware Detection Technique"],"prefix":"10.1007","author":[{"given":"Sagar","family":"Shaw","sequence":"first","affiliation":[]},{"given":"Manish Kumar","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Sanjay","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"48_CR1","unstructured":"Marinescu D.C., \u201cCloud Computing: Theory and Practice\u201d, MK Publication (2013)."},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Dahl G.E., Stokes J.W. et al., \u201cLarge-scale malware classification using random projections and neural networks\u201d, IEEE International Conference","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Hatem S.S., wafy M.H., et al., \u201cMalware Detection in Cloud Computing\u201d, International Journal of Advanced Computer Science and Applications (IJACSA), Vol 5, Science and Information (2014).","DOI":"10.14569\/IJACSA.2014.050427"},{"key":"48_CR4","unstructured":"Graham M., \u201cBehaviour of Botnets and Other Malware in Virtual Environments\u201d, The Open Web Application Security Project (2014)."},{"key":"48_CR5","unstructured":"Oberheide J., Cooke E. et al., \u201cCloudAV: N-Version Antivirus in the Network Cloud\u201d, 17th conference on Security symposium, pp- 91\u2013106 (2008)."},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Pedersen j., Bastola D., et al., \u201cBLAST Your Way through Malware Malware Analysis Assisted by Bioinformatics Tools\u201d, International Conference on Security and Management (2012).","DOI":"10.1016\/S1353-4858(12)70109-5"},{"key":"48_CR7","unstructured":"Mandl T., Bayer U.et al., \u201cANUBIS ANalyzing Unknown BInarieS The automatic Way\u201d, VIRUS Bulletin Conference, v 1.0.02 (2009)."},{"key":"48_CR8","unstructured":"Johnson D, Murari K. et al., \u201cEucalyptus Beginner\u2019s Guide- UEC Edition\u201d, v1.0 (2010)."},{"key":"48_CR9","unstructured":"Parmar H., Champaneria T., \u201cComparative Study of Open Nebula, Eucalyptus, Open Stack and Cloud Stack\u201d, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No. 2, pp 714\u2013721 (2014)."},{"key":"48_CR10","unstructured":"https:\/\/www.youtube.com\/watch?v=fV5kED7nryw ."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:30:21Z","timestamp":1568925021000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}