{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:42Z","timestamp":1738777242392,"version":"3.37.0"},"reference-count":12,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.11.2512-2519","type":"journal-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T04:43:27Z","timestamp":1381985007000},"source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Malware Based on Volatile Memory"],"prefix":"10.4304","volume":"8","author":[{"given":"Liang","family":"Hu","sequence":"first","affiliation":[]},{"given":"Shinan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Xiaolu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenzhen","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Kuo","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,10,16]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.06.002"},{"key":"ref3","volume-title":"Malware Analyst s Cookbook and DVD Tools and Techniques for Fighting Malicious Code","author":"Ligh","year":"2010","unstructured":"[3] Ligh M, Adair S, Hartstein B, et al. Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code. Wiley Publishing, 2010."},{"key":"ref4","first-page":"336","volume-title":"Signature generation and detection of malware families\/\/Information Security and Privacy","author":"Sathyanarayan","year":"2008","unstructured":"[5] Sathyanarayan V S, Kohli P, Bruhadeshwar B. Signature generation and detection of malware families\/\/Information Security and Privacy. Springer Berlin Heidelberg, 2008 pp. 336-349."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.45"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74320-0_10"},{"key":"ref7","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity","author":"Newsome","year":"2005","unstructured":"[8] Newsome J, Song D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity, Journal of software. 2005.","journal-title":"J Softw","ISSN":"https:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.4.5.313-320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.12.1655-1661"},{"issue":"10","key":"ref10","first-page":"1980","article-title":"IRC Botnet Detection Based on Host Behavior.","volume":"32","author":"Wei","year":"2009","unstructured":"[12] Wei W, Bin-Xing F, Xiang C U I. IRC Botnet Detection Based on Host Behavior. Chinese Journal of Computers, 2009, 32(10) pp. 1980-1988.","journal-title":"Chinese Journal of Computers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.3.223-230"},{"key":"ref12","volume-title":"Introduction to algorithms","author":"Cormen","year":"2001","unstructured":"[23] Cormen T H, Leiserson C E, Rivest R L, et al. Introduction to algorithms. MIT press, 2001."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:03:32Z","timestamp":1738775012000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,16]]},"references-count":12,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2013,10,16]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.11.2512-2519","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,10,16]]}}}