{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:43:36Z","timestamp":1749876216165},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/ccoms.2017.8075178","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T15:47:55Z","timestamp":1508946475000},"page":"16-20","source":"Crossref","is-referenced-by-count":13,"title":["Comparative study of recent MEA malware phylogeny"],"prefix":"10.1109","author":[{"given":"Joanna","family":"Moubarak","sequence":"first","affiliation":[]},{"given":"Maroun","family":"Chamoun","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Filiol","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.10.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504162"},{"journal-title":"Introduction to Cyber-warfare","year":"2013","author":"shakarian","key":"ref12"},{"key":"ref13","article-title":"Duqu-Threat Research and Analysis","author":"szor","year":"2011","journal-title":"McAfee Labs"},{"journal-title":"Researchers Connect Flame to US-Israel Stuxnet Attack","year":"2012","author":"zetter","key":"ref14"},{"journal-title":"Gaussian","article-title":"Kaspersky","year":"2012","key":"ref15"},{"journal-title":"Gauss Abnormal Distribution","article-title":"Securlist","year":"2012","key":"ref16"},{"key":"ref17","article-title":"Duqu 2.0: A comparaison to Duqu","author":"bencs\u00e1th","year":"2015","journal-title":"CrySiS Lab"},{"journal-title":"Malware evolution","year":"2015","author":"touchette","key":"ref18"},{"journal-title":"Github","year":"0","key":"ref4"},{"journal-title":"Malware Analyst's Coockbook and DVD","year":"2011","author":"ligh","key":"ref3"},{"key":"ref6","article-title":"FROM SHAMOON TO STONEDRILL Wipers attacking Saudi organizations and beyond","author":"lab","year":"2017","journal-title":"Kaspersky Lab"},{"key":"ref5","article-title":"Shamoon Rebooted in Middle East, Part 2","author":"beek","year":"2016","journal-title":"McAfee Labs"},{"key":"ref8","article-title":"Graph-based comparison of executable objects","author":"dullien","year":"0","journal-title":"SSTIC 2005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"journal-title":"Practical Malware Analysis","year":"2012","author":"sikorski","key":"ref2"},{"journal-title":"Cyber Attacks in Middle East","year":"2013","author":"pattar","key":"ref1"},{"key":"ref9","article-title":"Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering","author":"ding","year":"2015","journal-title":"Canada"}],"event":{"name":"2017 2nd International Conference on Computer and Communication Systems (ICCCS)","start":{"date-parts":[[2017,7,11]]},"location":"Krakow, Poland","end":{"date-parts":[[2017,7,14]]}},"container-title":["2017 2nd International Conference on Computer and Communication Systems (ICCCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055814\/8075168\/08075178.pdf?arnumber=8075178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T15:34:19Z","timestamp":1512056059000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8075178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ccoms.2017.8075178","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}