{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T11:27:07Z","timestamp":1772364427267,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:00:00Z","timestamp":1641254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T00:00:00Z","timestamp":1641254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,4]]},"DOI":"10.1109\/comsnets53615.2022.9668396","type":"proceedings-article","created":{"date-parts":[[2022,1,13]],"date-time":"2022-01-13T20:39:03Z","timestamp":1642106343000},"page":"138-146","source":"Crossref","is-referenced-by-count":6,"title":["Polymorphic Malware Behavior Through Network Trace Analysis"],"prefix":"10.1109","author":[{"given":"Xiyue","family":"Deng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jelena","family":"Mirkovic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_1"},{"key":"ref11","article-title":"Framing dependencies introduced by underground commoditization","author":"huang","year":"0","journal-title":"Workshop on the Economics of Information Security"},{"key":"ref12","first-page":"174","article-title":"Detecting malicious code by model checking","author":"kinder","year":"0","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.59"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.42"},{"key":"ref15","first-page":"163","article-title":"Deterlab testbed for cybersecurity research and education","volume":"28","author":"mirkovic","year":"2013","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16161-2_2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504162"},{"key":"ref18","year":"2012","journal-title":"2021 cyber security statistics"},{"key":"ref19","first-page":"793","article-title":"Static and dynamic mal ware analysis using machine learning","author":"raghuraman","year":"0","journal-title":"First International Conference on Sustainable Technologies for Computational Intelligence"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630086"},{"key":"ref27","year":"2012","journal-title":"VirusTotal Virustotal-free online virus malware and url scanner"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.01.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21236\/ADA449067"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"ref7","first-page":"1","article-title":"Understanding malware's network behaviors using fantasm","author":"deng","year":"0","journal-title":"Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results"},{"key":"ref2","article-title":"Scientific but not academical overview of malware anti-debugging, anti-disassembly and anti-vm technologies","author":"branco","year":"2012","journal-title":"Black Hat"},{"key":"ref9","author":"guarnieri","year":"2012","journal-title":"Cuckoo Sandbox"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978682"},{"key":"ref22","first-page":"271","article-title":"Cardinal pill testing of system virtual machines","author":"shi","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5120\/15544-4098"},{"key":"ref24","first-page":"4","article-title":"The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns","volume":"11","author":"stone-gross","year":"2011","journal-title":"LEET"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019791"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70086-1"}],"event":{"name":"2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS)","location":"Bangalore, India","start":{"date-parts":[[2022,1,4]]},"end":{"date-parts":[[2022,1,8]]}},"container-title":["2022 14th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9668311\/9667790\/09668396.pdf?arnumber=9668396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T20:27:32Z","timestamp":1650313652000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9668396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/comsnets53615.2022.9668396","relation":{},"subject":[],"published":{"date-parts":[[2022,1,4]]}}}