{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:46:47Z","timestamp":1747201607199,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/giis.2018.8635598","type":"proceedings-article","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T23:55:53Z","timestamp":1549583753000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["Agent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Ali","sequence":"first","affiliation":[]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Papadaki","sequence":"additional","affiliation":[]},{"given":"Bogdan V","family":"Ghita","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-010-0141-5"},{"article-title":"A static malware detection system using data mining methods. arXiv Prepr. arXiv 1308.2831","year":"2013","author":"baldangombo","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997496"},{"journal-title":"Automated Classification and Analysis of Internet Malware","year":"0","author":"m","key":"ref13"},{"journal-title":"SPADE Signature Based Packer Detection","year":"2012","author":"naval","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665799"},{"key":"ref16","first-page":"11","article-title":"Malware detection by behavioural sequential patterns","volume":"8","year":"2013","journal-title":"Comp Fraud & Sec"},{"key":"ref17","article-title":"Malware detection with different voting schemes, COMPUSOFT","volume":"2014","author":"j","year":"0","journal-title":"Int J Adv Comput Technol"},{"key":"ref18","first-page":"12","article-title":"Malware detection using windows API sequence and machine learning","volume":"43","year":"2012","journal-title":"Int J Comput Appl"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0410"},{"journal-title":"Before we knew it an empirical study of zero-day attacks in the real world","year":"2012","author":"dumitras","key":"ref4"},{"year":"0","key":"ref3"},{"journal-title":"Before we knew it Raleigh NC USA","year":"2012","author":"dumitras","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.49"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.016865"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2010.5665799"},{"year":"0","key":"ref2","article-title":"Internet security threat report, 0"},{"key":"ref1","volume":"3","author":"mathur","year":"2013","journal-title":"A Survey on Techniques in Detection and Analyzing Malware Executables"},{"key":"ref9","volume":"2","author":"yu","year":"2010","journal-title":"Malware variants identification based on byte frequency"},{"key":"ref20","article-title":"Differentiating malware from clean ware using behavioral analysis","author":"tian","year":"2010","journal-title":"NANCY"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70072-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70072-1"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794596"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00127"}],"event":{"name":"2018 Global Information Infrastructure and Networking Symposium (GIIS)","start":{"date-parts":[[2018,10,23]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 Global Information Infrastructure and Networking Symposium (GIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8632667\/8635591\/08635598.pdf?arnumber=8635598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:14:04Z","timestamp":1643235244000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8635598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/giis.2018.8635598","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}