{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:22:12Z","timestamp":1729624932693,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838251","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T15:03:46Z","timestamp":1406559826000},"page":"1-9","source":"Crossref","is-referenced-by-count":13,"title":["RevMatch: An efficient and robust decision model for collaborative malware detection"],"prefix":"10.1109","author":[{"given":"Carol J.","family":"Fung","sequence":"first","affiliation":[]},{"given":"Disney Y.","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Raouf","family":"Boutaba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Cloudav: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"Proc of the 17th USENIX Security Symp"},{"key":"17","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-642-04474-8_37","article-title":"Peer-to-peer architecture for collaborative intrusion and malware detection on a large scale","author":"marchetti","year":"2009","journal-title":"Information Security"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/LATINCOM.2010.5641013"},{"key":"15","first-page":"351","article-title":"Effective and efficient malware detection at the end host","author":"kolbitsch","year":"2009","journal-title":"Proceedings of the 18th Conference on USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/PDP.2010.30"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/NOMS.2010.5488489"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/2046707.2046742"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/SP.2010.11"},{"key":"12","article-title":"Design and management of collaborative intrusion detection networks","author":"fung","year":"2013","journal-title":"15th IFIP\/IEEE Intl Symp on Integrated Network Management Dissertation Track"},{"year":"2013","journal-title":"Evolving DDOS Attacks Provide the Driver for Financial Institutions to Enhance Response Capabilities","key":"3"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/DSNW.2010.5542598"},{"year":"0","journal-title":"Bredolab Bot Herder Gets 4 Years for 30 Million Infections","key":"2"},{"year":"0","journal-title":"Antivirus Vendors Go beyond Signature-based Antivirus","key":"1"},{"year":"2010","author":"fossi","journal-title":"Symantec global internet security threat report","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2005.63","article-title":"Collaborative internet worm containment","volume":"3","author":"cai","year":"2005","journal-title":"IEEE Security & Privacy"},{"year":"0","journal-title":"Trend Glitch Costs 8 Million","key":"6"},{"year":"0","journal-title":"Protecting Against the Rampant Conficker Worm","key":"5"},{"year":"0","journal-title":"McAfee Antivirus to Reimburse Consumers for Bad Update","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/978-3-540-74565-5_5","article-title":"Applying machine learning techniques for detection of malicious code in network traffic","author":"elovici","year":"2007","journal-title":"KI 2007 Advances in Artificial Intelligence"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1137\/1.9781611972818.12"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838251.pdf?arnumber=6838251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:26:09Z","timestamp":1498137969000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838251","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}