{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T23:34:25Z","timestamp":1721000065206},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,9,2]],"date-time":"2006-09-02T00:00:00Z","timestamp":1157155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2006,10,24]]},"DOI":"10.1007\/s11416-006-0024-y","type":"journal-article","created":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T12:10:37Z","timestamp":1157112637000},"page":"135-147","source":"Crossref","is-referenced-by-count":21,"title":["Testing and evaluating virus detectors for handheld devices"],"prefix":"10.1007","volume":"2","author":[{"given":"Jose Andre","family":"Morales","sequence":"first","affiliation":[]},{"given":"Peter J.","family":"Clarke","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"B. M.","family":"Golam Kibria","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,9,2]]},"reference":[{"key":"24_CR1","unstructured":"Conry-Murray, A.: Behavior blocking stops unknown malicious code. Netw. Mag. (2002) http:\/\/www.networkmagazine.com"},{"key":"24_CR2","unstructured":"Marx, A.: A guideline to anti-malware-software testing. In: European Institute for Computer Anti-Virus Research (EICAR) 2000 Best Paper Proceedings, 2000. pp. 218\u2013253."},{"key":"24_CR3","unstructured":"Morales, J.A., Clarke, P.J., Deng, Y.: Testing and evaluation of virus detectors for handheld devices. In: The Proceedings of NIST Workshop on Software Security Assurance Tools, Techniques, and Metrics (SSATTM), pp. 67\u201374 (2004)"},{"issue":"1","key":"24_CR4","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/242857.242869","volume":"40","author":"C. Nachenberg","year":"1997","unstructured":"Nachenberg C. (1997). Computer virus-antivirus coevolution. Commun. ACM 40(1):46\u201351. http:\/\/doi.acm.org\/10.1145\/242857.242869","journal-title":"Commun. ACM"},{"key":"24_CR5","unstructured":"Nachenberg, C.: Behavior blocking: the next step in anti-virus protection. Security Focus, March (2002) http:\/\/www.securityfocus.com\/infocus\/1557"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Ntafos, S.C.: On random and p1artition testing. In: ISSTA \u201998: Proceedings of the 1998 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 42\u201348 ACM Press, New York (1998). http:\/\/doi.acm. org\/10.1145\/271771.271785","DOI":"10.1145\/271771.271785"},{"key":"24_CR7","unstructured":"Peikari, C., Fogie S., Ratter\/29A.: Details emerge on the first windows mobile virus. informit.com (2004) http:\/\/www.informit.com\/articles\/article.asp?p=337069."},{"key":"24_CR8","unstructured":"Peikari, C., Fogie, S., Ratter\/29A, Read, J.: Reverse engineering the first pocket pc trojan. Sams Publishing (2004) http:\/\/www.samspublishing.com\/articles\/article.asp?p=340544."},{"key":"24_CR9","unstructured":"Symantec antivirus research center: http:\/\/securityresponse.symantec.com\/avcenter\/"},{"key":"24_CR10","unstructured":"Denning, D.: Cyberterrorism testimony before the special oversight panel of terrorism committee on armed services, house of representatives, May (2000) http:\/\/www.cs.georgetown.edu\/~denning\/infosec\/cyberterror.html"},{"key":"24_CR11","unstructured":"Mackey D., Gossels J., Johnson, B.C.: Securing your handheld devices. The ISSA Journal, April (2004). http:\/\/www.systemexperts.com\/tutors\/ISSAHandheldArticle.pdf"},{"key":"24_CR12","volume-title":"Computer Viruses: from Theory to Applications","author":"E. Filiol","year":"2005","unstructured":"Filiol E. (2005). Computer Viruses: from Theory to Applications. IRIS International series, Springer, Berlin Heidelberg Newyork Verlag, ISBN 2-287-23939-1"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Filiol, E.: Malware pattern scanning schemes secure against black box analysis. J. Comput. Virol., EICAR 2006 Special Issue, (2), 1 (2006)","DOI":"10.1007\/s11416-006-0009-x"},{"key":"24_CR14","unstructured":"Messmer, E.: Behavior blocking repels new viruses. Network World Fusion, January (2002) http:\/\/www.nwfusion.com\/news\/2002\/0128antivirus.html"},{"key":"24_CR15","unstructured":"Cohen, F.: A Short Course on Computer Viruses. Wiley Professional Computing (1994). ISBN 0-471-00769-2"},{"issue":"1","key":"24_CR16","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F. Schneider","year":"2000","unstructured":"Schneider F. (2000). Enforceable security policies. ACM Trans. Inf. Syst. Security, 3(1):30\u201350. http:\/\/doi.acm.org\/ 10.1145\/353323.353382","journal-title":"ACM Trans. Inf. Syst. Security"},{"key":"24_CR17","unstructured":"Vahid, F., Givargis, T.: Embedded System Design a Unified Hardware\/Software Introduction. Wiley (2002) ISBN 0-471-38678-2"},{"key":"24_CR18","unstructured":"Francia, G.: Embedded system programming. J Comput Sci Colleges 17(2), (2001)"},{"key":"24_CR19","volume-title":"Biostatistical Analysis","author":"J.H. Zar","year":"1999","unstructured":"Zar J.H. (1999). Biostatistical Analysis. Prentice-Hall, New Jersey. Second edition, ISBN 0-130-81542-X","edition":"2"},{"issue":"4","key":"24_CR20","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H. Zhu","year":"1997","unstructured":"Zhu H., Hall P., May J. (1997). Software unit test coverage and adequacy. ACM Comput. Surve. 29(4):366\u2013427","journal-title":"ACM Comput. Surve."},{"key":"24_CR21","unstructured":"Ibm research. virus timeline. http:\/\/www.research.ibm.com\/ antivirus\/timeline.htm"},{"key":"24_CR22","unstructured":"Myers, G.J. The Art of Software Testing. Wiley (2004). Second edition, ISBN 0-471-46912-2"},{"key":"24_CR23","unstructured":"Sheaffer, R.L., McClave J.T.: Probability and Statistics for Engineers. International Thomson Publishing and Wadsworth Publishing Company (1996) Fourth edition, ISBN 0-534-20964-5"},{"key":"24_CR24","unstructured":"Christodorescu, M., Jha, S.: Testing malware detectors. ISSTA \u201904: Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 34\u201344 (2004) http:\/\/doi.acm.org\/10.1145\/1007512.1007518"},{"key":"24_CR25","unstructured":"National vulnerability database. http:\/\/nvd.nist.gov\/"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Singh, P., Lakhotia, A.: Analysis and detection of computer viruses and worms: an annotated bibliography. In: ACM SIGPLAN Notices, Vol.37, pp. 29\u201335 (2002) http:\/\/doi. acm.org\/10.1145\/568600.568608","DOI":"10.1145\/568600.568608"},{"key":"24_CR27","unstructured":"Szor, P.: The Art of Computer Virus Research and Defense. Symantec Press and Addison-Wesley (2005). ISBN 9-780321-304544"},{"key":"24_CR28","unstructured":"Symantec Security White Paper: Wireless handheld and smartphone security. Technical report, Symantec Corporation (2003). http:\/\/www.symantec.com"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Ford, R.: The wrong stuff? IEEE Security Privacy (2004)","DOI":"10.1109\/MSP.2004.27"},{"key":"24_CR30","unstructured":"Fogie, S.: Pocket pc abuse: to protect and destroy. In: Black Hat USA (2004) http:\/\/www.airscanner.com\/pubs\/BlackHat2004.pdf"},{"issue":"1","key":"24_CR31","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/357489.357516","volume":"44","author":"S. Foley","year":"2001","unstructured":"Foley S., Dumigan R. (2001). Are handheld viruses a significant threat? Commun ACM 44(1):105\u2013107. http:\/\/doi.acm.org\/10.1145\/357489.357516","journal-title":"Commun ACM"},{"key":"24_CR32","unstructured":"Gordon, S., Howard, F.: Antivirus software testing for the new millennium. In: Proceedings of National Information Systems Security Conference (NISSC), (2000). http:\/\/csrc.nist.gov\/nissc\/2000\/proceedings\/papers\/038.pdf"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Gordon, S., Ford, R.: Real world anti-virus product reviews and evaluations - the current state of affairs. In: Proceedings of the 1996 National Information Systems Security Conference (1996)","DOI":"10.1016\/S1353-4858(00)90009-6"},{"key":"24_CR34","doi-asserted-by":"crossref","unstructured":"Gordon, S., Ford, R.: Computer crime revisited: the evolution of definition and classification. In: European Institute for Computer Anti-Virus Research (EICAR) (2006)","DOI":"10.1007\/s11416-006-0015-z"},{"key":"#cr-split#-24_CR35.1","unstructured":"Stata release 9.0. Stata Corporation (1999);"},{"key":"#cr-split#-24_CR35.2","unstructured":"College Station, Texas"},{"key":"24_CR36","unstructured":"Winrar. http:\/\/www.win-rar.com\/"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-006-0024-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-006-0024-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-006-0024-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T18:59:21Z","timestamp":1683572361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-006-0024-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,2]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,10,24]]}},"alternative-id":["24"],"URL":"https:\/\/doi.org\/10.1007\/s11416-006-0024-y","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9,2]]}}}