{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:14:51Z","timestamp":1758845691307,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554803","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"357-362","source":"Crossref","is-referenced-by-count":8,"title":["A Survey on Metamorphic Malware Detection based on Hidden Markov Model"],"prefix":"10.1109","author":[{"given":"Satheesh kumar","family":"Sasidharan","sequence":"first","affiliation":[]},{"given":"Ciza","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0215-x"},{"key":"ref11","first-page":"1","article-title":"A hidden Markov model detection of malicious Android applications at runtime","author":"chen","year":"2014","journal-title":"Wireless and Optical Communications Conference (WOCC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275913"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-015-0261-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2015.7382048"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2016.04.02"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860469"},{"journal-title":"MaMaDroid Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)","year":"0","author":"lucky","key":"ref17"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.20533\/ijicr.2042.4655.2018.0104","article-title":"Automated Malware detection Based on HMM and Genetic K-means","volume":"9","author":"alqurashi","year":"2018","journal-title":"International Journal of Intelligent Computing Research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04283-1_6"},{"key":"ref4","first-page":"133","article-title":"Detecting intrusions using system calls: Alternative data models","author":"warrender","year":"1999","journal-title":"Security and Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511790492"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0105-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-006-0028-7"},{"key":"ref8","first-page":"195","article-title":"Behavior-based Malware Analysis using Profile Hidden Markov Models","author":"ravi","year":"2013","journal-title":"Proceedings of International Conference on Security and Cryptography"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741874"},{"key":"ref2","first-page":"267","author":"rabiner","year":"1990","journal-title":"A tutorial on Hidden Markov Models and Selected Applications in Speech Recognition"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.217"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314397"},{"key":"ref22","first-page":"5","author":"lakhotia","year":"2004","journal-title":"Are Metamorphic Viruses Really Invincible? - Part I Virus Bulletin"},{"key":"ref21","first-page":"74","article-title":"Camouflage in Malware: From Encryption to Metamorphism","volume":"12","author":"rad","year":"2012","journal-title":"International Journal of Computer Science and Network Security"},{"year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177699147"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554803.pdf?arnumber=8554803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T17:36:41Z","timestamp":1605548201000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554803","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}