{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:02:38Z","timestamp":1758268958369,"version":"3.30.2"},"reference-count":0,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.15439\/2014f265","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T19:14:16Z","timestamp":1412018056000},"page":"101-110","source":"Crossref","is-referenced-by-count":12,"title":["Identification of malware activities with rules"],"prefix":"10.15439","volume":"2","author":[{"given":"Bartosz","family":"Jasiul","sequence":"first","affiliation":[]},{"given":"Joanna","family":"\u015aliwa","sequence":"additional","affiliation":[]},{"given":"Kamil","family":"Gleba","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"Szpyrka","sequence":"additional","affiliation":[]}],"member":"6175","published-online":{"date-parts":[[2014,9,29]]},"event":{"name":"2014 Federated Conference on Computer Science and Information Systems","start":{"date-parts":[[2014,9,7]]},"end":{"date-parts":[[2014,9,10]]},"acronym":"FedCSIS 2014"},"container-title":["Annals of Computer Science and Information Systems","Proceedings of the 2014 Federated Conference on Computer Science and Information Systems"],"original-title":[],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T07:29:21Z","timestamp":1733988561000},"score":1,"resource":{"primary":{"URL":"https:\/\/annals-csis.org\/Volume_2\/drp\/265.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,29]]},"references-count":0,"URL":"https:\/\/doi.org\/10.15439\/2014f265","relation":{},"ISSN":["2300-5963"],"issn-type":[{"type":"print","value":"2300-5963"}],"subject":[],"published":{"date-parts":[[2014,9,29]]}}}