{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:55:46Z","timestamp":1730199346092,"version":"3.28.0"},"reference-count":58,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:00:00Z","timestamp":1720656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:00:00Z","timestamp":1720656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,11]]},"DOI":"10.1109\/atsip62566.2024.10638878","type":"proceedings-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T17:42:30Z","timestamp":1724434950000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["An investigation of malware and the systems used to detect and identify malware"],"prefix":"10.1109","author":[{"given":"Fahad","family":"Mira","sequence":"first","affiliation":[{"name":"University of Bedfordshire,Department of Computer Science and Technology,UK"}]}],"member":"263","reference":[{"volume-title":"2013Threats Predictions","year":"2013","key":"ref1"},{"volume-title":"G-DataMalwareReport","year":"2010","author":"Berkenkopf","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557167"},{"article-title":"MalheurA novel tool for malware analysis","year":"2012","author":"Rieck","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.127"},{"volume-title":"Malware Detection Based on Hybrid Signature","author":"Ahmed","key":"ref6"},{"issue":"3","key":"ref7","first-page":"283","article-title":"BehaviourApplicationProgrammingInterfaceCallGraph","volume":"9","year":"2012","journal-title":"AmericanJournalofAppliedSciences"},{"issue":"3","key":"ref8","article-title":"Metamorphic Malware Detection Using Statistical Analysis","volume":"2","author":"Kaushal","year":"2012","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3087316"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.20"},{"key":"ref12","first-page":"116","article-title":"Panorama: capturing system-wide information flow for malware detection and analysis","volume-title":"Proceedings of the 14th ACM conference on Computer and communications security","author":"in H"},{"volume-title":"Survey on MalwareDetection Methods","year":"2009","author":"Vinod","key":"ref13"},{"volume-title":"whatiscloudAnti-Virusandhowitdoes work","author":"Zeltser","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_11"},{"journal-title":"Data Science: From Research to","article-title":"Static signature-based malware detection using opcode and binary information","author":"Azadeh","key":"ref17"},{"volume-title":"Application.SpringerIntemationalPublishing","year":"2020","key":"ref18"},{"key":"ref19","first-page":"351","article-title":"Effective and efficient malware detection at the end host","volume-title":"Proceedings of the 18th conference on USENIX security symposium","author":"Kolbitsch"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.24018\/ejeng.2021.6.3.2372"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00579-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118073"},{"volume-title":"Multi-agentPeer-to-PeerIntrusion Detection","author":"Gorodetsky","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73986-9"},{"volume-title":"AnA gent-BasedFrameworkforDistributed Intrusion Detections","year":"2009","author":"Ye","key":"ref26"},{"key":"ref27","first-page":"670","article-title":"Agent-Basedimmunityfor computer virus: abstraction from dendritic cell algorithm withdangertheory","volume-title":"Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing","author":"Ou"},{"key":"ref28","first-page":"177","article-title":"Intrusion detection in open peer-to-peermulti-agentsystems","volume-title":"Proceedings of the 5th international conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and services","author":"Bijani"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2011.5953199"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9512-6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.47893\/ijcns.2011.1009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"article-title":"Mechanisms of Polymorphic and Metamorphic Viruses","volume-title":"Intelligence and Security Informatics Conference (EISIC),2011","author":"Xufang","key":"ref33"},{"issue":"2","key":"ref34","first-page":"1","article-title":"A survey on automated dynamic malwareanalysis techniques and tools","volume":"44","author":"EroCarrera","year":"2008","journal-title":"ACM Comput. Surv"},{"article-title":"A SurveyofMalware Detection Techniques","year":"2007","author":"Idika","key":"ref35"},{"article-title":"DissectingSpam\u2019sPurportedHarms","year":"2003","author":"Goldman","key":"ref36"},{"article-title":"Algebraic specification of computer viruses and the ir environments","volume-title":"SelectedPapersfromtheFirst ConferenceonAlgebraandCoalgebrainComputerScienceYoungResear chersWorkshop(CALCO-jnr 2005)","author":"Webster","key":"ref37"},{"key":"ref38","article-title":"Malicious Mobile Code: Virus Protection for Windows","author":"Grimes","year":"2001","journal-title":"O\u2019Reilly Media"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36302"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63857"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63859"},{"article-title":"A Unix Prototype for Intrusion and A nomaly Detection in Secure Networks (1990)","volume-title":"Proceeding. 13 th National Computer SecurityConference","author":"Winkler","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3056614"},{"key":"ref45","article-title":"APHRODITE: an Anomaly-based A rchitecture for False Positive Reduction","author":"Bolzoni","year":"2006","journal-title":"Centre for Telematics and Information Technology, University of Twente: Enschede"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"article-title":"FuzzyDataMining And Genetic Algorithms Applied To Intrusion Detection","volume-title":"Proceedings of the National Information Systems Security Conference (NISSC)","author":"S.M.B.a.R.B.V.a.A.P.a.A","key":"ref47"},{"article-title":"Intrusion Detection: Host-Based and Network-Based Intrusion Detection Systems","year":"2003","author":"Kozushko","key":"ref48"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.55041\/ijsrem35564"},{"key":"ref50","first-page":"87936","article-title":"algorithms","volume":"9","year":"2021","journal-title":"IeeeAccess"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11767-004-0111-5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2966321"},{"key":"ref53","first-page":"14329","article-title":"assistance","volume":"8","year":"2020","journal-title":"IEEEAccess"},{"key":"ref54","first-page":"64","article-title":"ARemoteIDS Based on MultiAgent Systems, Web Services and MDA","volume-title":"Proceedings of the International Conference on Software Engineering Advances","author":"Silva"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.12.003"},{"author":"Steroids","key":"ref56","article-title":"Malware online scanners"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICWR49608.2020.9122312"},{"volume-title":"IEEE","key":"ref58"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.28"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138"},{"author":"Aslan","key":"ref62","article-title":"A comprehensivereviewonmalwaredetectionapproaches"},{"issue":"2020","key":"ref63","first-page":"6249","volume-title":"IEEEaccess","volume":"8"}],"event":{"name":"2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP)","start":{"date-parts":[[2024,7,11]]},"location":"Sousse, Tunisia","end":{"date-parts":[[2024,7,13]]}},"container-title":["2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10638790\/10638839\/10638878.pdf?arnumber=10638878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:15:17Z","timestamp":1725340517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10638878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,11]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/atsip62566.2024.10638878","relation":{},"subject":[],"published":{"date-parts":[[2024,7,11]]}}}