{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:01:15Z","timestamp":1729674075515,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745108","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T11:04:49Z","timestamp":1232103889000},"page":"59-68","source":"Crossref","is-referenced-by-count":6,"title":["Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets"],"prefix":"10.1109","author":[{"given":"Arnur G.","family":"Tokhtabayev","sequence":"first","affiliation":[]},{"given":"Victor A.","family":"Skormin","sequence":"additional","affiliation":[]},{"given":"Andrey M.","family":"Dolgikh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","volume":"1","author":"jensen","year":"1996","journal-title":"Coloured Petri nets (2nd ed ) Basic concepts analysis methods and practical use"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDENTCOM.2007.4444663"},{"key":"13","article-title":"automatic application-specific sandboxing for win32\/x86 binaries","author":"li","year":"2006","journal-title":"Proc Proceedings of Program Analysis for Security and Safety Workshop (PASSWORD) co-located with ECOOP 2006"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.31"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/SECPRI.2004.1301324","article-title":"formalizing sensitivity in static analysis for intrusion detection","author":"feng","year":"2004","journal-title":"Proc IEEE Symposium on Security and Privacy"},{"key":"3","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Computers & Security"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652094"},{"key":"1","article-title":"know your enemy: why your web site is at risk","author":"cobb","year":"2005","journal-title":"SearchSecurity com Security School"},{"year":"0","key":"10"},{"key":"7","first-page":"391","article-title":"anomaly detection based on system call classification","volume":"15","author":"xu","year":"2004","journal-title":"Journal of Software"},{"year":"0","key":"6"},{"key":"5","article-title":"modeling system calls for id with dynamic window sizes","author":"stolfo","year":"2001","journal-title":"Proc DISCEX II"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40981-6_16"},{"key":"9","first-page":"174","article-title":"operating system enhancements to prevent the misuse of system calls","author":"bernaschi","year":"2000","journal-title":"Proc ACM Conference on Computer and Communications Security"},{"key":"8","article-title":"on the detection of anomalous system call arguments","author":"kruegel","year":"2003","journal-title":"Proc ESORICS"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, TX, USA","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745108.pdf?arnumber=4745108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T15:41:16Z","timestamp":1589470876000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745108\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745108","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}