{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:08:37Z","timestamp":1773670117330,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/hpcsim.2013.6641425","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:23:43Z","timestamp":1383089023000},"page":"266-272","source":"Crossref","is-referenced-by-count":2,"title":["Generating malware signature using transcoding from sequential data to amino acid sequence"],"prefix":"10.1109","author":[{"given":"Yue","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yijie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuhui","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.003"},{"key":"22","first-page":"227","article-title":"Anomalous payload-based worm detection and signature generation","author":"wang","year":"2005","journal-title":"Recent Advances in Intrusion Detection"},{"key":"17","first-page":"96","article-title":"Survey of automatic attack signature generation","volume":"30","author":"tang","year":"2009","journal-title":"Journal on Communications"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2008.4525505"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73547-2_49"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"16","first-page":"1384","article-title":"Defending against internet worms: A signaturebased approach","volume":"2","author":"tang","year":"2005","journal-title":"IEEE INFOCOM"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.2000.4042"},{"key":"14","article-title":"Automated worm fingerprinting","volume":"99","author":"singh","year":"2004","journal-title":"Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.0030123"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/22.22.4673"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-5-113"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.130"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1006\/jmbi.1990.9999"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"1","first-page":"271","article-title":"Autograph: Toward automated, distributed worm signature detection","author":"ah kim","year":"2004","journal-title":"USENIX Security Symposium"},{"key":"7","article-title":"Honeycomb -Creating intrusion detection signatures using honeypots","author":"kreibich","year":"1990","journal-title":"USENIX Technical Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gki198"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/BF02257378"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69384-0_55"},{"key":"9","first-page":"964","article-title":"An algorithm for generation of attack signatures based on sequences alignment","volume":"3","author":"nan","year":"2008","journal-title":"Computer Science and Software Engineering 2008 International Conference on"},{"key":"8","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1126\/science.2983426","article-title":"Rapid and sensitive protein similarity searches","volume":"227","author":"lipman","year":"1985","journal-title":"Science"}],"event":{"name":"2013 International Conference on High Performance Computing & Simulation (HPCS)","location":"Helsinki, Finland","start":{"date-parts":[[2013,7,1]]},"end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6619547\/6641375\/06641425.pdf?arnumber=6641425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:02:05Z","timestamp":1498093325000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2013.6641425","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}