{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:25:29Z","timestamp":1705962329537},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,5,17]],"date-time":"2012-05-17T00:00:00Z","timestamp":1337212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s11416-012-0164-1","type":"journal-article","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T22:03:51Z","timestamp":1337119431000},"page":"133-140","source":"Crossref","is-referenced-by-count":8,"title":["The proactivity of Perceptron derived algorithms in malware detection"],"prefix":"10.1007","volume":"8","author":[{"given":"Mihai","family":"Cimpoe\u015fu","sequence":"first","affiliation":[]},{"given":"Dragos","family":"Gavrilu\u0163","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Popescu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,17]]},"reference":[{"key":"164_CR1","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/TDSC.2008.74","volume":"7","author":"J. Kinder","year":"2010","unstructured":"Kinder J., Katzenbeisser S., Schallhart C., Veith H.: Proactive detection of computer worms using model checking. IEEE Trans. Depend. Secure Comput. 7, 424\u2013438 (2010)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"164_CR2","doi-asserted-by":"crossref","unstructured":"Berard, B., Bidoit, M., Finkel, A., Laroussinie, F., Petit, A., Petrucci, L., Schnoe-Belen, Ph., Mckenzie, P.: Systems and Software Verification: Model-Checking Techniques and Tools (2001)","DOI":"10.1007\/978-3-662-04558-9"},{"key":"164_CR3","first-page":"112","volume-title":"Pacific Asia Workshop on Intelligence and Security Informatics. Lecture Notes in computes Science, vol. 5477","author":"R. Moskovitch","year":"2009","unstructured":"Moskovitch R., Feher C., Elovici Y.: A chronological evaluation of unknown malcode detection. In: Chen, H., Yang, C.C., Chau, M., Li, S.-H. (eds) Pacific Asia Workshop on Intelligence and Security Informatics. Lecture Notes in computes Science, vol. 5477, pp. 112\u2013117. Springer, Heidelberg (2009)"},{"key":"164_CR4","doi-asserted-by":"crossref","unstructured":"Rieck, K.: Computer security and machine learning: worst enemies or best friends? DIMVA Workshop on Systems Security (SYSSEC) (2011)","DOI":"10.1109\/SysSec.2011.16"},{"key":"164_CR5","unstructured":"Momina, S.T., Zubair, S.M., Muddassar, F.: Malware detection using statistical analysis of byte-level file content. In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics (2009)"},{"issue":"4","key":"164_CR6","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K. Rieck","year":"2011","unstructured":"Rieck K., Trinius Ph., Willems C., Holz T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639\u2013668 (2011)","journal-title":"J. Comput. Secur."},{"key":"164_CR7","unstructured":"Harris, M.: Behavioral Genotype Technology: A New Approach to Proactive Detection of New Malware (2007)"},{"key":"164_CR8","doi-asserted-by":"crossref","unstructured":"Gavrilu\u0163, D., Cimpoe\u015fu, M., Anton, D., Ciortuz, L.: Malware detection using machine learning. In: International Multiconference on Computer Science and Information Technology-IMCSIT. IEEE, pp. 735\u2013741 (2009)","DOI":"10.1109\/IMCSIT.2009.5352759"},{"key":"164_CR9","volume-title":"Honeypots: Tracking Hackers","author":"L. Spitzner","year":"2002","unstructured":"Spitzner L.: Honeypots: Tracking Hackers. Addison-Wesley, Boston (2002)"},{"key":"164_CR10","unstructured":"Oberheide, J., Bailey, M., Farnam, J.: PolyPack: an automated online packing service for optimal antivirus evasion. In: Proceedings of the 3rd USENIX conference on Offensive Technologies (2009)"},{"issue":"5","key":"164_CR11","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1093\/bioinformatics\/16.5.412","volume":"16","author":"P. Baldi","year":"2000","unstructured":"Baldi P., Brunak S., Chauvin Y., Andersen C.A.F., Nielsen H.: Assessing the accuracy of prediction algorithms for classification: an overview. Bioinformatics 16(5), 412\u2013424 (2000)","journal-title":"Bioinformatics"},{"key":"164_CR12","volume-title":"The Perceptron: A Probabilistic Model for Information Storage and Organization in the Brain","author":"F. Rosenblatt","year":"1958","unstructured":"Rosenblatt F.: The Perceptron: A Probabilistic Model for Information Storage and Organization in the Brain. MIT Press, Cambridge (1958)"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-012-0164-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-012-0164-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-012-0164-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T15:44:02Z","timestamp":1561736642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-012-0164-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,17]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["164"],"URL":"https:\/\/doi.org\/10.1007\/s11416-012-0164-1","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,17]]}}}