{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:35:49Z","timestamp":1762522549027},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1109\/ictc49870.2020.9289450","type":"proceedings-article","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T22:58:16Z","timestamp":1608591496000},"page":"1549-1552","source":"Crossref","is-referenced-by-count":1,"title":["Malware Response Naming Scheme for Security Control Service"],"prefix":"10.1109","author":[{"given":"Shinho","family":"Lee","sequence":"first","affiliation":[]},{"given":"Wookhyun","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Seohyun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Eui","family":"Tak Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"224","article-title":"A Dose By Any Other Name","author":"bureau","year":"2008","journal-title":"Proc 18th Virus Bulletin Int Conf"},{"key":"ref11","article-title":"The Game of The Name Malware Naming, Shape Shifters and Sympathetic Magic","author":"harley","year":"2009","journal-title":"3rd Int Conf on Cybercrime Forensics Education & Training (CFET)"},{"year":"0","key":"ref12","article-title":"Symantec Develops New Attack on Cyberhacking"},{"key":"ref13","first-page":"14","article-title":"The Common Malware Enumeration (CME) initiative","author":"kuo","year":"2005","journal-title":"Virus Bulletin"},{"key":"ref14","first-page":"6","article-title":"Cooperative Heuristics","author":"park","year":"2006","journal-title":"Virus Bulletin"},{"year":"0","key":"ref15","article-title":"MITRE - MultiScanner Documentation"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_11"},{"key":"ref4","first-page":"11","article-title":"Reviewing What&#x2019;s in the Wild","author":"coursen","year":"1998","journal-title":"Virus Bulletin"},{"key":"ref3","article-title":"The WildList&#x2013;Still Useful","author":"bontchev","year":"1999","journal-title":"9th Virus Bulletin Int Conf"},{"key":"ref6","first-page":"1","article-title":"Call of the WildList: Last Orders for Wildcore-based Testing","author":"harley","year":"2010","journal-title":"Proc 20th Virus Bulletin Int Conf"},{"key":"ref5","first-page":"136","article-title":"The WildList is Dead, Long Live the WildList","author":"marx","year":"2007","journal-title":"Proc 17th Virus Bulletin Int Conf"},{"key":"ref8","first-page":"9","article-title":"Anti-Virus Spamming and The Virus-Naming Mess: Part 1","author":"bontchev","year":"2004","journal-title":"Virus Bulletin"},{"key":"ref7","first-page":"54","article-title":"On the Evolution of Malware Species","author":"vlachos","year":"2011","journal-title":"global Security Safety and Sustainability & e-Democracy Thessaloniki Greece"},{"key":"ref2","first-page":"177","article-title":"What is Wild?","author":"gordon","year":"1997","journal-title":"Proc 20th NIST-NCSC National Information Systems Security Conf"},{"key":"ref1","article-title":"Current Status of the CARO Malware Naming Scheme","author":"bontchev","year":"2005","journal-title":"15th Virus Bulletin Int Conf"},{"key":"ref9","first-page":"13","article-title":"Anti-Virus Spamming and The Virus-Naming Mess: Part 2","author":"bontchev","year":"2004","journal-title":"Virus Bulletin"}],"event":{"name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","start":{"date-parts":[[2020,10,21]]},"location":"Jeju, Korea (South)","end":{"date-parts":[[2020,10,23]]}},"container-title":["2020 International Conference on Information and Communication Technology Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9289075\/9289076\/09289450.pdf?arnumber=9289450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:19:21Z","timestamp":1656375561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9289450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ictc49870.2020.9289450","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]}}}