{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:58:13Z","timestamp":1648871893385},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,2,7]],"date-time":"2007-02-07T00:00:00Z","timestamp":1170806400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2007,3,21]]},"DOI":"10.1007\/s11416-007-0036-2","type":"journal-article","created":{"date-parts":[[2007,2,6]],"date-time":"2007-02-06T12:34:10Z","timestamp":1170765250000},"page":"39-49","source":"Crossref","is-referenced-by-count":8,"title":["Intrusion detection and virology: an analysis of differences, similarities and complementariness"],"prefix":"10.1007","volume":"3","author":[{"given":"Benjamin","family":"Morin","sequence":"first","affiliation":[]},{"given":"Ludovic","family":"M\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,7]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Adleman, L.: An abstract theory of computer viruses. In: Advances in Cryptology. Lecture Notes in Computer Science, vol. 403, pp 354\u2013374. Springer, New York (1988)","DOI":"10.1007\/0-387-34799-2_28"},{"key":"36_CR2","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Bonfante, G., Kaczmarek, M., Marion, J.-Y.: Toward an abstract computer virology. In: International Colloquium on Theoretical Aspects of Computing. Lecture Notes in Computer Science, vol. 3722, pp 579\u2013593. Springer, New York (2005)","DOI":"10.1007\/11560647_38"},{"issue":"3","key":"36_CR4","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11416-005-0007-4","volume":"1","author":"G. Bonfante","year":"2006","unstructured":"Bonfante G., Kaczmarek M. and Marion J.-Y. (2006). On abstract computer virology from a recursion theoretic perspective. J. Comput. Virol. 1(3): 45\u201354","journal-title":"J. Comput. Virol."},{"key":"36_CR5","unstructured":"Brunnstein, K.: From AntiVirus to AntiMalware Software and beyond: another approach to the protection of customers from dysfunctional system behaviour. In 22th National Information Systems Security Conference, pp 12\u201326 (1999)"},{"key":"36_CR6","unstructured":"Charlier, B.L., Mounji, A., Swimmer, M.: Dynamic detection and classification of computer viruses using general behaviour patterns. In: Proceedings of 5th International Virus Bulletin Conference (1995)"},{"key":"36_CR7","unstructured":"Cohen, F.: Computer viruses. PhD Thesis, University of Southern California (1985)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Ann. des T\u00e9l\u00e9commun. 55(7-8), 361\u2013378 (2000)","DOI":"10.1007\/BF02994844"},{"issue":"2","key":"36_CR9","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning D.E. (1987). An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2): 222\u2013232","journal-title":"IEEE Trans. Softw. Eng."},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"D\u2019Haeseleer, P., Forrest, S., Helman, P.: An immunological approach to change detection: algorithms, analysis and implications. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Oakland, pp 110\u2013119 (1996)","DOI":"10.1109\/SECPRI.1996.502674"},{"key":"36_CR11","unstructured":"Filiol, E.: Computer viruses: from theory to applications. Springer, New York (2005)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society, IEEE Computer Society Press, pp~120\u2013128, May 1996","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Habra, N., Charlier, B.L., Mounji, A., Mathieu, I.: ASAX: software architecture and rule-based language for universal audit trail analysis. In: Proceedings of the 2nd European Symposium on Research in Computer Security (ESORICS\u201992). Lecture Notes in Computer Science, vol. 648, pp 435\u2013450. Springer, New York (1992)","DOI":"10.1007\/BFb0013912"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Ko, C., Redmond, T.: Noninterference and intrusion detection. In: Proceedings of the IEEE Symposium on Security and Privacy (2002)","DOI":"10.1109\/SECPRI.2002.1004370"},{"key":"36_CR15","unstructured":"Kolesnikov, O., Lee, W.: Advanced polymorphic worms: evading IDS by blending in with normal traffic. In: USENIX Security Symposium (2006)"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Pouzol, J.-P., Ducass\u00e9, M.: From declarative signatures to misuse IDS. In W.~Lee, L.~M\u00e9, A.~Wespi (eds.) In: Proceedings of the 4th International Symposium on the Recent Advances in Intrusion Detection (RAID\u20192001). LNCS, vol. 2212, pp~1\u201321, October (2001)","DOI":"10.1007\/3-540-45474-8_1"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Pouzol, J.-P., Ducass\u00e9, M.: Formal specification of intrusion signatures and detection rules. In: Proceedings of the 15th IEEE Computer Security Foudations Workshop (CSFW\u201902). IEEE Computer Society, pp 64\u201376, June (2002)","DOI":"10.1109\/CSFW.2002.1021807"},{"issue":"3","key":"36_CR18","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1162\/artl.1994.1.3.249","volume":"1","author":"E.H. Spafford","year":"1994","unstructured":"Spafford E.H. (1994). Computer viruses as artificial life. J. Artif. Life 1(3): 249\u2013265","journal-title":"J. Artif. Life"},{"key":"36_CR19","unstructured":"Swimmer,M.: Review and outlook of the detection of viruses using intrusion detection systems. In Debar H., M\u00e9 L., Wu S.F. (eds.) In: Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (RAID\u20192000). LNCS, vol. 1907. Springer, New York, October 2000 (Extended abstract)"},{"key":"36_CR20","unstructured":"Swimmer, M.: Malware intrusion detection. PhD Thesis, Hamburg University (2005)"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Totel, E., Vivinis, B., M\u00e9, L.: A language driven intrusion detection system for event and alert correlation. In: Proceedings ot the 19th IFIP International Information Security Conference, pp 209\u2013224, Toulouse. Kluwer, Dordrecht, August 2004.","DOI":"10.1007\/1-4020-8143-X_14"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Viinikka, J., Debar, H., M\u00e9, L., S\u00e9guier, R.: Time series modeling for IDS alert management. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS\u201906), pp 102\u2013113. ACM Press (2006)","DOI":"10.1145\/1128817.1128835"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A content anomaly detector resistant to mimicry attack. In: Zamboni, D., Kruegel, C. (eds.) Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 4219, pp 226\u2013248. Springer, New York (2006)","DOI":"10.1007\/11856214_12"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Erland Jonsson, Alfonso Valdes, Magnus Almgren (eds.) Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID\u20192004). Lecture Notes in Computer Science, vol. 3224, pp 203\u2013222. Springer, New York, September 15\u201317 (2004)","DOI":"10.1007\/978-3-540-30143-1_11"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Zimmermann, J., M\u00e9, L., Bidan, C.: Introducing reference flow control for detecting intrusion symptoms at the os level. In: Wespi, A., Vigna, G., Deri, L. (eds.) Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID\u20192002). Lecture Notes in Computer Science, vol. 2516, pp 292\u2013306. Springer, New York (2002)","DOI":"10.1007\/3-540-36084-0_16"},{"key":"36_CR26","doi-asserted-by":"crossref","unstructured":"Zimmermann, J., M\u00e9, L., Bidan, C.: Experimenting with a policy-based hids based on an information flow control model. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), December (2003)","DOI":"10.1109\/CSAC.2003.1254341"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0036-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-007-0036-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-007-0036-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,8]],"date-time":"2021-08-08T12:22:09Z","timestamp":1628425329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-007-0036-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2,7]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,3,21]]}},"alternative-id":["36"],"URL":"https:\/\/doi.org\/10.1007\/s11416-007-0036-2","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,2,7]]}}}