{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:34Z","timestamp":1750306714111,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,9]],"date-time":"2014-09-09T00:00:00Z","timestamp":1410220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,9]]},"DOI":"10.1145\/2659651.2659737","type":"proceedings-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T13:41:52Z","timestamp":1418737312000},"page":"379-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Exploring Worm Behaviors using DTW"],"prefix":"10.1145","author":[{"given":"Smita","family":"Naval","sequence":"first","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, India"}]},{"given":"Vijay","family":"Laxmi","sequence":"additional","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, India"}]},{"given":"Neha","family":"Gupta","sequence":"additional","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, India"}]},{"given":"Manoj Singh","family":"Gaur","sequence":"additional","affiliation":[{"name":"Malaviya National Institute of Technology, Jaipur, India"}]},{"given":"Muttukrishnan","family":"Rajarajan","sequence":"additional","affiliation":[{"name":"City University of London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2014,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74048-3_4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Bayer U.","year":"2009","unstructured":"U. Bayer , P. M. Comparetti , C. Hlauschek , C. Kr\u00fcgel , and E. Kirda . Scalable, behavior--based malware clustering . In Proceedings of the Network and Distributed System Security Symposium (NDSS) , San Diego, California, USA , 2009 . U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kr\u00fcgel, and E. Kirda. Scalable, behavior--based malware clustering. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, USA, 2009."},{"key":"e_1_3_2_1_4_1","first-page":"92","volume-title":"Using sensor networks and data fusion for early detection of active worms","author":"Berk V. H.","year":"2003","unstructured":"V. H. Berk , R. S. Gray , and G. Bakos . Using sensor networks and data fusion for early detection of active worms . volume 5071 , pages 92 -- 104 , 2003 . V. H. Berk, R. S. Gray, and G. Bakos. Using sensor networks and data fusion for early detection of active worms. volume 5071, pages 92--104, 2003."},{"key":"e_1_3_2_1_5_1","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-0-387-68768-1_4","volume-title":"Botnet Detection","author":"Brumley D.","year":"2008","unstructured":"D. Brumley , C. Hartwig , Z. Liang , J. Newsome , D. Song , and H. Yin . Automatically identifying trigger-based behavior in malware . In W. Lee, C. Wang, and D. Dagon, editors, Botnet Detection , volume 36 of Advances in Information Security , pages 65 -- 88 . 2008 . D. Brumley, C. Hartwig, Z. Liang, J. Newsome, D. Song, and H. Yin. Automatically identifying trigger-based behavior in malware. In W. Lee, C. Wang, and D. Dagon, editors, Botnet Detection, volume 36 of Advances in Information Security, pages 65--88. 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"In Proceedings of the International Conference on Dependable Systems and Networks","author":"Chen X.","year":"2008","unstructured":"X. Chen , J. Andersen , Z. Morley , M. Michael , and B. J. Nazario . Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware . In In Proceedings of the International Conference on Dependable Systems and Networks , 2008 . X. Chen, J. Andersen, Z. Morley, M. Michael, and B. J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In In Proceedings of the International Conference on Dependable Systems and Networks, 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455779"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.11"},{"issue":"4","key":"e_1_3_2_1_9_1","first-page":"348","article-title":"Nonlinear alignment and averaging for estimating the evoked potential. Biomedical Engineering","volume":"43","author":"Gupta L.","year":"1996","unstructured":"L. Gupta , D. L. Molfese , R. Tammana , and P. G. Simos . Nonlinear alignment and averaging for estimating the evoked potential. Biomedical Engineering , IEEE Transactions on , 43 ( 4 ): 348 -- 356 , April 1996 . L. Gupta, D. L. Molfese, R. Tammana, and P. G. Simos. Nonlinear alignment and averaging for estimating the evoked potential. Biomedical Engineering, IEEE Transactions on, 43(4):348--356, April 1996.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012801612483"},{"key":"e_1_3_2_1_11_1","unstructured":"S. Hao W. Wang H. Lu and P. Ren. Automal: automatic clustering and signature generation for malwares based on the network flow. Security and Communication Networks.  S. Hao W. Wang H. Lu and P. Ren. Automal: automatic clustering and signature generation for malwares based on the network flow. Security and Communication Networks."},{"volume-title":"Windows win32k.sys system call table. april","year":"2014","key":"e_1_3_2_1_12_1","unstructured":"J00ru. Windows win32k.sys system call table. april 2014 . J00ru. Windows win32k.sys system call table. april 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"e_1_3_2_1_14_1","volume-title":"Finding groups in data: an introduction to cluster analysis","author":"Kaufman L.","year":"2009","unstructured":"L. Kaufman and P. J. Rousseeuw . Finding groups in data: an introduction to cluster analysis , volume 344 . John Wiley & Sons , 2009 . L. Kaufman and P. J. Rousseeuw. Finding groups in data: an introduction to cluster analysis, volume 344. John Wiley & Sons, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.764"},{"key":"e_1_3_2_1_16_1","volume-title":"Endmal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Mathematical and Computer Modelling, 58(5--6):1140--1154","author":"Lu H.","year":"2013","unstructured":"H. Lu , X. Wang , B. Zhao , F. Wang , and J. Su . Endmal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Mathematical and Computer Modelling, 58(5--6):1140--1154 , 2013 . H. Lu, X. Wang, B. Zhao, F. Wang, and J. Su. Endmal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Mathematical and Computer Modelling, 58(5--6):1140--1154, 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/978-3-642-12541-6","volume-title":"A Concise Guide to Market Research","author":"Mooi E.","year":"2011","unstructured":"E. Mooi and M. Sarstedt . Cluster analysis . In A Concise Guide to Market Research , pages 237 -- 284 . Springer Berlin Heidelberg , 2011 . E. Mooi and M. Sarstedt. Cluster analysis. In A Concise Guide to Market Research, pages 237--284. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-012-0296-4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.006"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972554"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.022"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364657"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433049"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-009-0238-2"},{"issue":"2","key":"e_1_3_2_1_25_1","first-page":"22","article-title":"A model for computer worm detection in a computer network","volume":"66","author":"A. O. T, A.","year":"2013","unstructured":"A. O. T, A. B. K, and G. A. J. Article : A model for computer worm detection in a computer network . International Journal of Computer Applications , 66 ( 2 ): 22 -- 28 , March 2013 . Published by Foundation of Computer Science, New York, USA. A. O. T, A. B. K, and G. A. J. Article: A model for computer worm detection in a computer network. International Journal of Computer Applications, 66(2):22--28, March 2013. Published by Foundation of Computer Science, New York, USA.","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.236"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550362"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.13"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.161"}],"event":{"name":"SIN '14: The 7th International Conference on Security of Information and Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","MNIT Malaviya National Institute of Technology","Aksaray Univ. Aksaray University","SICSA The Scottish Informatics and Computer Science Alliance","University of Glasgow University of Glasgow"],"location":"Glasgow Scotland UK","acronym":"SIN '14"},"container-title":["Proceedings of the 7th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659737","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659651.2659737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:22Z","timestamp":1750231162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,9]]},"references-count":29,"alternative-id":["10.1145\/2659651.2659737","10.1145\/2659651"],"URL":"https:\/\/doi.org\/10.1145\/2659651.2659737","relation":{},"subject":[],"published":{"date-parts":[[2014,9,9]]},"assertion":[{"value":"2014-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}