{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:05:22Z","timestamp":1771700722008,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,12,25]],"date-time":"2010-12-25T00:00:00Z","timestamp":1293235200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s11416-010-0148-y","type":"journal-article","created":{"date-parts":[[2010,12,24]],"date-time":"2010-12-24T02:46:34Z","timestamp":1293158794000},"page":"201-214","source":"Crossref","is-referenced-by-count":85,"title":["Hunting for undetectable metamorphic viruses"],"prefix":"10.1007","volume":"7","author":[{"given":"Da","family":"Lin","sequence":"first","affiliation":[]},{"given":"Mark","family":"Stamp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,25]]},"reference":[{"issue":"2","key":"148_CR1","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s11416-008-0105-1","volume":"5","author":"S. Attaluri","year":"2009","unstructured":"Attaluri S., McGhee S., Stamp M.: Profile hidden Markov models and metamorphic virus detection. J. Comput. Virol. 5(2), 151\u2013169 (2009)","journal-title":"J. Comput. Virol."},{"key":"148_CR2","volume-title":"Computer Viruses and Malware","author":"J. Aycock","year":"2006","unstructured":"Aycock J.: Computer Viruses and Malware. Springer, Berlin (2006)"},{"key":"148_CR3","doi-asserted-by":"crossref","unstructured":"Bailey, M. et\u00a0al.: Automated Classification and Analysis of Internet Malware, RAID 2007, LNCS 4637, pp. 178\u2013197. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-74320-0_10"},{"key":"148_CR4","unstructured":"Caillat, B.A., Desnos, Erra, R.: BinThavro: Towards a Useful and Fast Tool for Goodware and Malware Analysis, ECIW (2010)"},{"issue":"1","key":"148_CR5","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22\u201335 (1987)","journal-title":"Comput. Secur."},{"key":"148_CR6","unstructured":"Daoud, E., Jebril, I.: Computer virus strategies and detection methods. Int. J. Open Problems Comput. Math. 1(2). (2008). http:\/\/www.emis.de\/journals\/IJOPCM\/files\/IJOPCM(vol.1.2.3.S.08).pdf"},{"key":"148_CR7","unstructured":"Desai, P.: Towards an undetectable computer virus. Master\u2019s report, Departent of Computer Science, San Jose State University. (2008). http:\/\/www.cs.sjsu.edu\/faculty\/stamp\/students\/Desai_Priti.pdf"},{"key":"148_CR8","volume-title":"Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids","author":"R. Durbin","year":"1999","unstructured":"Durbin R. et\u00a0al.: Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids. Cambridge University Press, Cambridge (1999)"},{"key":"148_CR9","unstructured":"FASM. http:\/\/flatassembler.net\/"},{"issue":"2","key":"148_CR10","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11416-007-0041-5","volume":"3","author":"E. Filiol","year":"2007","unstructured":"Filiol E., Josse S.: A statistical model for undecidable viral detection. J. Comput. Virol. 3(2), 65\u201374 (2007)","journal-title":"J. Comput. Virol."},{"key":"148_CR11","unstructured":"Gheorghescu, M.: An automated virus classification system. In: Virus Bulletin Conference (2005)"},{"key":"148_CR12","unstructured":"Gueguen, G., Filiol, E.: New threat grammars, IAWACS (2010)"},{"key":"148_CR13","unstructured":"IDA Pro. http:\/\/www.hex-rays.com\/idapro\/"},{"key":"148_CR14","doi-asserted-by":"crossref","unstructured":"Lin, D.: Hunting for undetectable metamorphic viruses. Master\u2019s report, Department of Computer Science, San Jose State University (2010)","DOI":"10.1007\/s11416-010-0148-y"},{"key":"148_CR15","unstructured":"Mishra, P., Stamp, M.: Software uniqueness: how and why. In: Dey, P.P., Amin, M.N., Gatton, T.M. (eds.): Proceedings of Conference on Computer Science and its Applications. San Diego, July 2003. http:\/\/www.cs.sjsu.edu\/~stamp\/cv\/papers\/iccsaPuneet.doc"},{"key":"148_CR16","doi-asserted-by":"crossref","unstructured":"Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77(2) (1989)","DOI":"10.1109\/5.18626"},{"key":"148_CR17","unstructured":"Stamp, M.: A revealing introduction to hidden Markov models, January 2004. http:\/\/www.cs.sjsu.edu\/faculty\/stamp\/RUA\/HMM.pdf"},{"key":"148_CR18","doi-asserted-by":"crossref","DOI":"10.1002\/0471744190","volume-title":"Information Security: Principles and Practice","author":"M. Stamp","year":"2005","unstructured":"Stamp M.: Information Security: Principles and Practice. Wiley, New York (2005)"},{"key":"148_CR19","unstructured":"Szor, P., Ferrie, P.: Hunting for Metamorphic. Symantec Press, Cupertino. (2005). http:\/\/www.symantec.com\/avcenter\/reference\/hunting.for.metamorphic.pdf"},{"key":"148_CR20","unstructured":"Venkatachalam, S.: Detecting undetectable computer viruses. Master\u2019s report, Department of Computer Science, San Jose State University (2010). http:\/\/www.cs.sjsu.edu\/faculty\/stamp\/students\/venkatachalam_sujandharan.pdf"},{"key":"148_CR21","unstructured":"Walenstein, A., et\u00a0al: The design space of metamorphic malware. In: Proceedings of the 2nd International Conference on Information Warfare, March 2007"},{"issue":"3","key":"148_CR22","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s11416-006-0028-7","volume":"2","author":"W. Wong","year":"2006","unstructured":"Wong W., Stamp M.: Hunting for metamorphic engines. J. Comput. Virol. 2(3), 211\u2013229 (2006)","journal-title":"J. Comput. Virol."},{"issue":"3","key":"148_CR23","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s11416-009-0121-9","volume":"5","author":"P. Zbitskiy","year":"2009","unstructured":"Zbitskiy P.: Code mutation techniques by means of formal grammars and automatons. J. Comput. Virol. 5(3), 199\u2013207 (2009)","journal-title":"J. Comput. Virol."}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-010-0148-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-010-0148-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-010-0148-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T06:41:45Z","timestamp":1637044905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-010-0148-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,25]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["148"],"URL":"https:\/\/doi.org\/10.1007\/s11416-010-0148-y","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,25]]}}}