{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T20:49:22Z","timestamp":1648673362768},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,7,15]],"date-time":"2012-07-15T00:00:00Z","timestamp":1342310400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Intell Manuf"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s10845-012-0681-2","type":"journal-article","created":{"date-parts":[[2012,7,14]],"date-time":"2012-07-14T07:58:52Z","timestamp":1342252732000},"page":"147-155","source":"Crossref","is-referenced-by-count":3,"title":["A malicious behavior analysis based Cyber-I birth"],"prefix":"10.1007","volume":"25","author":[{"given":"Jie","family":"Wen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianhua","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Runhe","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qun","family":"Jin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jian","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benxiong","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ning","family":"Zhong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,7,15]]},"reference":[{"issue":"7","key":"681_CR1","first-page":"667","volume":"38","author":"Z. Chen","year":"2008","unstructured":"Chen Z., Wei P., Delis A. (2008) Catching remote administration trojans (RATs). Software: Practice and Experience, 38(7): 667\u2013703. doi: 10.1002\/spe.837","journal-title":"Software: Practice and Experience,"},{"key":"681_CR2","doi-asserted-by":"crossref","unstructured":"Chira, O., Chira, C., Roche, T., Tormey, D., & Brennan, A. (2006). An agent-based approach to knowledge management in distributed design. Journal of Intelligent Manufacturing, 17(6), 737\u2013750. doi: 10.1007\/s10845-006-0042-0 .","DOI":"10.1007\/s10845-006-0042-0"},{"key":"681_CR3","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S. A., Song, D., & Bryant, R. E. (2005). Semantics-aware malware detection. In IEEE symposium on security and privacy, 2005 (pp. 32\u201346). doi: 10.1109\/SP.2005.20 .","DOI":"10.1109\/SP.2005.20"},{"issue":"2","key":"681_CR4","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1080\/01972243.1994.9960160","volume":"10","author":"R. Clarke","year":"1994","unstructured":"Clarke R. (1994) The digital persona and its application to data surveillance. The Information Society, 10(2): 77\u201392. doi: 10.1080\/01972243.1994.9960160","journal-title":"The Information Society,"},{"key":"681_CR5","unstructured":"Ghosh, A. K., Schwartzbard, A., & Schatz, M. (1999). Learning program behavior profiles for intrusion detection. In: Conference on workshop on intrusion detection and network monitoring, 1999(Vol. 1, pp. 51\u201362)."},{"key":"681_CR6","volume-title":"Ubiquitous user modeling","author":"D. Heckmann","year":"2005","unstructured":"Heckmann D. (2005) Ubiquitous user modeling. IOS Press, Amsterdam"},{"issue":"4","key":"681_CR7","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/32.588541","volume":"23","author":"E. Jonsson","year":"1997","unstructured":"Jonsson E., Olovsson T. (1997) A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 23(4): 235\u2013245. doi: 10.1109\/32.588541 .","journal-title":"IEEE Transactions on Software Engineering,"},{"key":"681_CR8","volume-title":"Behavior-based spyware detection","author":"E. Kirda","year":"2006","unstructured":"Kirda E., Kruegel C. (2006) Behavior-based spyware detection. Usenix Association, Berkeley"},{"key":"681_CR9","unstructured":"Kruegel, C., Robertson, W., & Vigna, G. (2004). Detecting kernel-level rootkits through binary analysis. In: Computer security applications conference, 2004 (pp. 91\u2013100)."},{"key":"681_CR10","unstructured":"Kunii, T. L., Ma, J., & Huang, R. (1996). Hyperworld modeling. In: Proceedings of international conference visual information systems (VIS 96), 1996 (pp. 1\u20138)."},{"key":"681_CR11","doi-asserted-by":"crossref","unstructured":"Kwon, T., & Su, Z. (2011). Modeling high-level behavior patterns for precise similarity analysis of software. In IEEE international conference on data mining (ICDM), 2011 (pp. 1134\u20131139). doi: 10.1109\/ICDM.2011.104 .","DOI":"10.1109\/ICDM.2011.104"},{"key":"681_CR12","unstructured":"Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In Proceedings of the 7th conference on USENIX Security Symposium, 1998 (Vol. 7, p. 6)."},{"key":"681_CR13","unstructured":"Ma, J. (2005). Smart u-things and ubiquitous intelligence. In L. T. Yang, X. Zhou, W. Zhao, Z. Wu, Y. Zhu, & M. Lin (Eds.), Embedded software and systems (Vol. 3820, pp. 776\u2013776). Berlin, Heidelberg: Springer."},{"key":"681_CR14","doi-asserted-by":"crossref","unstructured":"Ma, J., Wen, J., Huang, R., & Huang, B. (2011). Cyber-Individual meets brain informatics. IEEE Intelligent Systems, 26(5), 30\u201337. doi: 10.1109\/MIS.2011.55 .","DOI":"10.1109\/MIS.2011.55"},{"issue":"4","key":"681_CR15","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/BF00124828","volume":"7","author":"P. Maturana F.","year":"1996","unstructured":"Maturana F. P., Norrie D. H. (1996) Multi-agent mediator architecture for distributed manufacturing. Journal of Intelligent Manufacturing, 7(4): 257\u2013270. doi: 10.1007\/BF00124828","journal-title":"Journal of Intelligent Manufacturing,"},{"key":"681_CR16","volume-title":"The society of mind","author":"M. Minsky","year":"1988","unstructured":"Minsky M. (1988) The society of mind. Simon & Schuster, New York"},{"key":"681_CR17","unstructured":"Pouget, F., & Dacier, M. (2004). Honeypot-based forensics. In AusCERT Asia Pacific information technology security conference, 2004."},{"key":"681_CR18","doi-asserted-by":"crossref","unstructured":"Qiao, H., Peng, J., Feng, C., & Rozenblit, J. W. (2007). Behavior analysis-based learning framework for host level intrusion detection. In Engineering of computer-based systems (ECBS 07), 2007 (pp. 441\u2013447). doi: 10.1109\/ECBS.2007.23 .","DOI":"10.1109\/ECBS.2007.23"},{"key":"681_CR19","doi-asserted-by":"crossref","unstructured":"Shtykh, R. Y., & Jin, Q. (2011). A human-centric integrated approach to web information search and sharing. Human-centric Computing and Information Sciences, 1(1), 1\u201337. doi: 10.1186\/2192-1962-1-2 .","DOI":"10.1186\/2192-1962-1-2"},{"issue":"1","key":"681_CR20","first-page":"61","volume":"2","author":"L Tong","year":"2011","unstructured":"Tong L, Fajiang Y, Xueyuan K, Yue Y (2011) Trusted computing dynamic attestation using a static analysis based behaviour model. Journal of Supercomputing 2(1): 61\u201368","journal-title":"Journal of Supercomputing"},{"issue":"2","key":"681_CR21","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSP.2007.45","volume":"5","author":"C Willems","year":"2007","unstructured":"Willems C, Holz T, Freiling F (2007) Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy 5(2): 32\u201339","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"681_CR22","first-page":"35","volume":"2","author":"P Yulia","year":"2011","unstructured":"Yulia P, Dae-Wha S (2011) Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. Journal of Supercomputing 2(1): 35\u201342","journal-title":"Journal of Supercomputing"},{"key":"681_CR23","doi-asserted-by":"crossref","unstructured":"Zhong, N., Ma, J. H., Huang, R. H., Liu, J. M., Yao, Y. Y., Zhang, Y. X., et\u00a0al. (2010). Research challenges and perspectives on Wisdom Web of Things (W2T). The Journal of Supercomputing, 1\u201321. doi: 10.1007\/s11227-010-0518-8 .","DOI":"10.1007\/s11227-010-0518-8"}],"container-title":["Journal of Intelligent Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10845-012-0681-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10845-012-0681-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10845-012-0681-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T02:11:55Z","timestamp":1559268715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10845-012-0681-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,15]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["681"],"URL":"https:\/\/doi.org\/10.1007\/s10845-012-0681-2","relation":{},"ISSN":["0956-5515","1572-8145"],"issn-type":[{"value":"0956-5515","type":"print"},{"value":"1572-8145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,15]]}}}