{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T05:29:24Z","timestamp":1745558964255},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811031526"},{"type":"electronic","value":"9789811031533"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3153-3_55","type":"book-chapter","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T07:13:59Z","timestamp":1489648439000},"page":"551-559","source":"Crossref","is-referenced-by-count":9,"title":["A Framework for Dynamic Malware Analysis Based on Behavior Artifacts"],"prefix":"10.1007","author":[{"given":"T. G.","family":"Gregory Paul","sequence":"first","affiliation":[]},{"given":"T.","family":"Gireesh Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,17]]},"reference":[{"key":"55_CR1","unstructured":"Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, 2012."},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Egele, Manuel, et al. \u201cA survey on automated dynamic malware-analysis techniques and tools.\u201d ACM Computing Surveys (CSUR) 44.2 (2012): 6.","DOI":"10.1145\/2089125.2089126"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Mohaisen, Aziz, Omar Alrawi, and Manar Mohaisen. \u201cAmal: High-fidelity, behavior-based automated malware analysis and classification.\u201d Computers & Security (2015).","DOI":"10.1016\/j.cose.2015.04.001"},{"key":"55_CR4","unstructured":"Malware tips, https:\/\/malwaretips.com ."},{"key":"55_CR5","doi-asserted-by":"crossref","unstructured":"Pirscoveanu, Radu S., et al. \u201cAnalysis of Malware behavior: Type classification using machine learning.\u201d Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015 International Conference on. IEEE, 2015.","DOI":"10.1109\/CyberSA.2015.7166115"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Shijo, P. V., and A. Salim. \u201cIntegrated Static and Dynamic Analysis for Malware Detection.\u201d Procedia Computer Science 46 (2015): 804\u2013811.","DOI":"10.1016\/j.procs.2015.02.149"},{"key":"55_CR7","doi-asserted-by":"crossref","unstructured":"Naval, Smita, et al. \u201cEmploying Program Semantics for Malware Detection.\u201d Information Forensics and Security, IEEE Transactions on 10.12 (2015): 2591\u20132604.","DOI":"10.1109\/TIFS.2015.2469253"},{"key":"55_CR8","unstructured":"University of Waikato, http:\/\/www.cs.waikato.ac.nz ."},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Kawaguchi, Naoto, and Kazumasa Omote. \u201cMalware Function Classification Using APIs in Initial Behavior.\u201d Information Security (AsiaJCIS), 2015 10th Asia Joint Conference on. IEEE, 2015.","DOI":"10.1109\/AsiaJCIS.2015.15"},{"key":"55_CR10","doi-asserted-by":"crossref","unstructured":"Ozsoy, Meltem, et al. \u201cMalware-aware processors: A framework for efficient online malware detection.\u201d High Performance Computer Architecture (HPCA), 2015 IEEE 21st International Symposium on. IEEE, 2015.","DOI":"10.1109\/HPCA.2015.7056070"},{"key":"55_CR11","unstructured":"Cuckoo Sandbox, http:\/\/www.cuckoosandbox.org ."},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, Xuxian, Xinyuan Wang, and Dongyan Xu. \u201cStealthy malware detection through vmm-based out-of-the-box semantic view reconstruction.\u201d Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007.","DOI":"10.1145\/1315245.1315262"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3153-3_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T20:30:57Z","timestamp":1568925057000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3153-3_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811031526","9789811031533"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3153-3_55","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}