{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:40:48Z","timestamp":1755794448571,"version":"3.44.0"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/malware.2015.7413689","type":"proceedings-article","created":{"date-parts":[[2016,2,26]],"date-time":"2016-02-26T11:26:08Z","timestamp":1456485968000},"page":"93-100","source":"Crossref","is-referenced-by-count":1,"title":["Measuring the information security risk in an infrastructure"],"prefix":"10.1109","author":[{"given":"Ferenc","family":"Leitold","sequence":"first","affiliation":[{"name":"Secudit Hungary"}]},{"given":"Kalman","family":"Hadarics","sequence":"additional","affiliation":[{"name":"College of Dunaujvaros Hungary"}]},{"given":"Eszter","family":"Oroszi","sequence":"additional","affiliation":[{"name":"Secudit Hungary"}]},{"given":"Krisztina","family":"Gyorffy","sequence":"additional","affiliation":[{"name":"University Pannonia"}]}],"member":"263","reference":[{"journal-title":"Telstra","article-title":"The Security Threat Landscape in Australia","year":"2014","key":"ref10"},{"journal-title":"Verizon","article-title":"Data Breach Investigations Report","year":"2015","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703683"},{"journal-title":"NSS Labs","article-title":"Cyber-Advanced Warning System","year":"2015","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999416"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2013.6703682"},{"key":"ref3","article-title":"A meta-analysis of recent malware tests","author":"ford","year":"2013","journal-title":"Virus Bulletin"},{"key":"ref6","article-title":"Understanding the cost associated with data security breaches","author":"gwebu","year":"0","journal-title":"PACIS 2014 Proceedings"},{"article-title":"Securing the Borderless Network: Security for the Web 2.0 World","year":"2010","author":"gillis","key":"ref5"},{"journal-title":"NSS Labs","article-title":"Consumer AV\/EPP Comparative Analysis - Exploit-Evasion Defenses Edition 1","year":"2013","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2012.6461008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2014.6999413"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WATeR.2014.7015756"},{"year":"2014","key":"ref9","article-title":"Security Stack (NGFW) Test Methodology vl.0."}],"event":{"name":"2015 10th International Conference on Malicious and Unwanted Software (MALWARE)","start":{"date-parts":[[2015,10,20]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2015,10,22]]}},"container-title":["2015 10th International Conference on Malicious and Unwanted Software (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7405773\/7413673\/07413689.pdf?arnumber=7413689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T18:17:40Z","timestamp":1755281860000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7413689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/malware.2015.7413689","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}