{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:02:01Z","timestamp":1761807721597,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122815","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T22:01:11Z","timestamp":1326319271000},"page":"173-178","source":"Crossref","is-referenced-by-count":15,"title":["Investigation of bypassing malware defences and malware detections"],"prefix":"10.1109","author":[{"given":"Farid","family":"Daryabar","sequence":"first","affiliation":[]},{"given":"Ali","family":"Dehghantanha","sequence":"additional","affiliation":[]},{"given":"Nur Izura","family":"Udzir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"159","article-title":"Apply data mining to defense-in-depth network security system","volume":"1","author":"huang","year":"0","journal-title":"IEEE International Conference on Advanced Information Networking and Applications (AINA) 2005"},{"journal-title":"Know Your Enemy Learning about Security Threats","year":"2004","key":"16"},{"key":"13","first-page":"173","author":"szczepanik","year":"2010","journal-title":"Detecting New and Unknown Malwares Using Honeynet"},{"key":"14","first-page":"174","author":"szczepanik","year":"2010","journal-title":"Detecting New and Unknown Malwares Using Honeynet"},{"journal-title":"Dictionary and Thesaurus","year":"2010","key":"11"},{"journal-title":"Know Your Enemy Learning about Security Threats","year":"2004","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007518"},{"journal-title":"CSI Computer Crime & Security Survey","year":"2008","author":"richardson","key":"2"},{"key":"1","first-page":"173","author":"szczepanik","year":"2010","journal-title":"Detecting New and Unknown Malwares Using Honeynet"},{"journal-title":"Security 601 Reverse-Engineering Malware The Essentials of Malware Analysis","year":"2009","author":"zeltser","key":"10"},{"journal-title":"CigiCigi Online","year":"2010","key":"7"},{"journal-title":"Annual Report Pandalabs 2008","year":"2008","key":"6"},{"journal-title":"Cracking the Perimeter V 1 1 Anti-Virus Comparative No 23","year":"2009","author":"aharoni","key":"5"},{"key":"4","first-page":"3","author":"christiansen","year":"2010","journal-title":"Bypassing Malware Defenses"},{"journal-title":"Security 504 Hacker Techniques Exploits and Incident Handling","year":"2006","author":"skoudis","key":"9"},{"key":"8","first-page":"8","author":"christiansen","year":"2010","journal-title":"Bypassing Malware Defenses"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122815.pdf?arnumber=6122815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T19:41:42Z","timestamp":1490125302000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122815\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122815","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}