{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:16:30Z","timestamp":1725480990834},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/mue.2008.119","type":"proceedings-article","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T03:30:12Z","timestamp":1299555012000},"page":"485-489","source":"Crossref","is-referenced-by-count":1,"title":["Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection"],"prefix":"10.1109","author":[{"given":"Kohei","family":"Tatara","sequence":"first","affiliation":[]},{"given":"Yoshiaki","family":"Hori","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"automated worm fingerprinting","author":"singh","year":"2004","journal-title":"Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (OSDI)"},{"key":"2","article-title":"autograph: toward automated, distributed worm signature detection","author":"kim","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"journal-title":"Polymorphic Shellcode Engine","year":"0","key":"10"},{"key":"1","article-title":"honeycomb creating intrusion detection signatures using honeypots","author":"kreibich","year":"2003","journal-title":"Proceedings of the Second Workshop on Hot Topics in Networks (Hotnets II)"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36084-0_15","article-title":"accurate buffer overflow detection via","author":"toth","year":"2002","journal-title":"Proceedings of 5th Symposium on Recent Advances in Intrusion Detection (RAID2002)"},{"key":"6","article-title":"analyzing network traffic to detect self-decrypting exploit code","author":"zhang","year":"2007","journal-title":"Proceedings of the 2007 ACM Symposium on InformAtion Computer and Communications Security (ASI-ACCS0?7)"},{"key":"5","article-title":"hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience","author":"li","year":"2006","journal-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&PO?6)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"journal-title":"ADMmutate Polymorphic Shellcode Engine","year":"0","author":"macaulay","key":"9"},{"journal-title":"Common Vulnerabilities and Exposures CVE-2001-0010","year":"2001","key":"8"}],"event":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","start":{"date-parts":[[2008,4,24]]},"location":"Busan, Korea","end":{"date-parts":[[2008,4,26]]}},"container-title":["2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/4505670\/4505671\/04505774.pdf?arnumber=4505774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:47:43Z","timestamp":1497890863000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/4505774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":10,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/mue.2008.119","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}