{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:23:24Z","timestamp":1725794604570},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/malware.2009.5403022","type":"proceedings-article","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T09:31:47Z","timestamp":1265967107000},"page":"31-38","source":"Crossref","is-referenced-by-count":7,"title":["Nebula - generating syntactical network intrusion signatures"],"prefix":"10.1109","author":[{"given":"Tillmann","family":"Werner","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Fuchs","sequence":"additional","affiliation":[]},{"given":"Elmar","family":"Gerhards-Padilla","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Martini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"ref12","first-page":"229","article-title":"Snort - Lightweight Intrusion Detection for Net-works","author":"roesch","year":"1999","journal-title":"In Proc of the 13th Conference on Systems Admin-istration"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2007.06.011"},{"key":"ref14","first-page":"45","article-title":"Automated Worm Fingerprinting","author":"singh","year":"2004","journal-title":"Proc 6th Symp Operating Systems Design and Implementation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BF01206331"},{"key":"ref16","first-page":"97","article-title":"An Architecture for Generating Semantics-Aware Signatures","author":"yegneswaran","year":"2005","journal-title":"Proc of the 14th USENIX Security Symposium"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2006.3"},{"key":"ref6","article-title":"Honeycomb-Creating Intrusion Detection Signatures Using Honeypots","author":"kreibich","year":"2003","journal-title":"Proc 2nd Workshop on Hot Topics in Netw (HotNets-II)"},{"key":"ref5","first-page":"271","article-title":"Autograph: Toward Automated, Distributed Worm Signature Detection","author":"kim","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"ref8","first-page":"32","article-title":"Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience","author":"li","year":"2006","journal-title":"Proc of the 2006 IEEE Svmposium on Security and Privacy"},{"key":"ref7","article-title":"Know Your Enemy: Containing Con-ficker","author":"leder","year":"2009","journal-title":"tech rep Honeynet Project"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","article-title":"Automated Classification and Analysis of Internet Malware","author":"bayley","year":"2007","journal-title":"Proc 3rd International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref1","first-page":"193","article-title":"Detection of New Malicious Code Using N-grams Signatures","author":"abou-assaleh","year":"2004","journal-title":"Proc of the 2nd Annual Conference on Privacy Security and Trust"},{"key":"ref9","article-title":"An Analysis of the 1999 DARPA\/Lincoln Laboratory Evaluation Data for Network Anomaly Detection","author":"mahoney","year":"2003","journal-title":"Technical Report"}],"event":{"name":"2009 4th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2009,10,13]]},"location":"Montreal, Quebec, Canada","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 4th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5392747\/5403012\/05403022.pdf?arnumber=5403022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:43:04Z","timestamp":1497832984000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5403022\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/malware.2009.5403022","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}