{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:25:58Z","timestamp":1725449158844},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/ewdts.2015.7493177","type":"proceedings-article","created":{"date-parts":[[2016,6,16]],"date-time":"2016-06-16T20:15:55Z","timestamp":1466108155000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["A sandboxing method to protect cloud cyberspace"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Adamov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anders","family":"Carlsson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"article-title":"An Undetectable Computer Virus","year":"2000","author":"chess","key":"ref11"},{"journal-title":"NioGuard Analysis System","year":"2015","key":"ref12"},{"journal-title":"OpenStack Foundation","year":"2015","key":"ref13"},{"journal-title":"Amazon Elastic Compute Cloud","year":"2015","key":"ref14"},{"key":"ref4","article-title":"Stuxnet Attackers Used 4 Windows Zero-Day Exploits","author":"naraine","year":"2010","journal-title":"ZDNet"},{"article-title":"Lavasoft Security Bulletin","year":"2013","author":"adamov","key":"ref3"},{"key":"ref6","article-title":"AntiVirus Firm BitDefender Admits Breach, Hacker Claims Stolen Passwords Are Unencrypted","author":"fox-brewster","year":"2015","journal-title":"Forbes"},{"article-title":"Kaspersky Lab ivestigates hacker attack on its own netwrok","year":"2015","author":"kaspersky","key":"ref5"},{"key":"ref8","article-title":"PlugX Uses Legitimate Samsung Application for DLL Side-Loading","author":"falcone","year":"2015","journal-title":"Paloalto Networks"},{"key":"ref7","article-title":"Zeus Downloader Comes as GoogleUpdate","author":"adamov","year":"2013","journal-title":"Lavasoft"},{"year":"2015","key":"ref2","article-title":"Cloud Atlas: RedOctoberAPT is back in style"},{"journal-title":"Kaspersky Lab","article-title":"APT Logbook","year":"2015","key":"ref1"},{"key":"ref9","article-title":"Detecting targeted cyber attacks in the cloud","author":"adamov","year":"2015","journal-title":"Mirantis"}],"event":{"name":"2015 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2015,9,26]]},"location":"Batumi, Georgia","end":{"date-parts":[[2015,9,29]]}},"container-title":["2015 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7488713\/7493093\/07493177.pdf?arnumber=7493177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T12:04:58Z","timestamp":1489752298000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7493177\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2015.7493177","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}