{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T09:28:47Z","timestamp":1656235727153},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2006,12]]},"DOI":"10.1007\/s11623-006-0237-8","type":"journal-article","created":{"date-parts":[[2007,1,23]],"date-time":"2007-01-23T13:53:04Z","timestamp":1169560384000},"page":"768-772","source":"Crossref","is-referenced-by-count":2,"title":["Auffinden von verschleierter Malware"],"prefix":"10.1007","volume":"30","author":[{"given":"Marcel","family":"Lehner","sequence":"first","affiliation":[]},{"given":"Eckehard","family":"Hermann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,1]]},"reference":[{"key":"237_CR1","unstructured":"Slade, Robert: Software Forensics. McGraw-Hill Education, 1 Auflage, 2004."},{"key":"237_CR2","unstructured":"Bania, Piotr: Fighting EPO Viruses. http:\/\/www.securityfocus.com\/print\/infocus\/1841 , Jun. 2005."},{"key":"237_CR3","unstructured":"Sz\u00f6r, Peter: The Art Of Computer Virus Research And Defense, Addison-Wesley, 1 Auflage, Feb. 2005."},{"key":"237_CR4","doi-asserted-by":"crossref","unstructured":"Adam Young, Moti Yung: Malicious Cryptography. Exposing Cryptovirology. John Wiley & Sons, 1 Auflage, Feb. 2004.","DOI":"10.1016\/S0267-3649(04)00079-2"},{"key":"237_CR5","unstructured":"Symantec: Understanding and Managing Polymorphic Viruses. Symantec White Paper Series, 30, Jul. 1999."},{"key":"237_CR6","unstructured":"BSI: http:\/\/www.bsi.de\/av\/vb\/blaster.htm"},{"key":"237_CR7","unstructured":"BSI: http:\/\/www.bsi.de\/av\/vb\/tremor.htm"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0237-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-006-0237-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-006-0237-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:20Z","timestamp":1559412500000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-006-0237-8"}},"subtitle":["Einsatz der heuristischen Analyse"],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":7,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["237"],"URL":"https:\/\/doi.org\/10.1007\/s11623-006-0237-8","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,12]]}}}