{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T07:48:07Z","timestamp":1769068087200,"version":"3.49.0"},"reference-count":14,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"3","funder":[{"name":"Ministry of Science, ICT and Future Planning, Korea","award":["IITP-2015-H8501-15-1"],"award-info":[{"award-number":["IITP-2015-H8501-15-1"]}]},{"name":"Ministry of Science, ICT and Future Planning, Korea","award":["013"],"award-info":[{"award-number":["013"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,7,2]]},"DOI":"10.1080\/10798587.2015.1118916","type":"journal-article","created":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T07:56:04Z","timestamp":1465199764000},"page":"371-377","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":17,"title":["Malware Analysis and Classification Using Sequence Alignments"],"prefix":"10.32604","volume":"22","author":[{"given":"In Kyeom","family":"Cho","sequence":"first","affiliation":[]},{"given":"Tae Guen","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yu Jin","family":"Shim","sequence":"additional","affiliation":[]},{"given":"Minsoo","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Eul Gyu","family":"Im","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,6,6]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2010.8"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-2836(05)80360-2"},{"key":"CIT0004","first-page":"103","volume":"4","author":"Cho I. K.","year":"2014","journal-title":"Journal of Internet Service and Information Security (JISIS)"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2014.52006"},{"key":"CIT0007","first-page":"1","author":"Han K. S.","year":"2014","journal-title":"International Journal of Information Security"},{"key":"CIT0008","first-page":"135","author":"Hunt G.","year":"1999","journal-title":"Usenix Windows NT Symposium"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.06.003"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40576-1_37"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"CIT0013","first-page":"13","volume":"3","author":"Saeed I. A.","year":"2013","journal-title":"Analysis"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0074-9"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1118916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:08:54Z","timestamp":1591189734000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1118916"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":14,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,21]]},"published-print":{"date-parts":[[2016,7,2]]}},"alternative-id":["10.1080\/10798587.2015.1118916"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1118916","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,6]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}