{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T17:19:42Z","timestamp":1725038382063},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,19]],"date-time":"2013-06-19T00:00:00Z","timestamp":1371600000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s11416-013-0187-2","type":"journal-article","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T16:39:20Z","timestamp":1386693560000},"page":"1-10","source":"Crossref","is-referenced-by-count":9,"title":["Malware analysis performance enhancement using cloud computing"],"prefix":"10.1007","volume":"10","author":[{"given":"Osamah L.","family":"Barakat","sequence":"first","affiliation":[]},{"given":"Shaiful J.","family":"Hashim","sequence":"additional","affiliation":[]},{"given":"Raja Syamsul Azmir B.","family":"Raja Abdullah","sequence":"additional","affiliation":[]},{"given":"Abdul Rahman","family":"Ramli","sequence":"additional","affiliation":[]},{"given":"Fazirulhisyam","family":"Hashim","sequence":"additional","affiliation":[]},{"given":"Khairulmizam","family":"Samsudin","sequence":"additional","affiliation":[]},{"given":"Mahmud","family":"Ab Rahman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,19]]},"reference":[{"key":"187_CR1","unstructured":"Anubis Malware Analyzer. http:\/\/anubis.iseclab.org\/"},{"key":"187_CR2","unstructured":"CloudStack. http:\/\/incubator.apache.org\/cloudstack\/"},{"key":"187_CR3","unstructured":"Cuckoo sandbox. http:\/\/cuckoobox.org\/"},{"key":"187_CR4","unstructured":"Hadoop. http:\/\/hadoop.apache.org\/"},{"key":"187_CR5","doi-asserted-by":"crossref","unstructured":"Adrian Martinez, C., Isaza Echeverri, G., Castillo Sanz, A.G.: Malware detection based on cloud computing integrating intrusion ontology representation. In: 2010 IEEE Latin-American Conference on Communications, pp. 1\u20136. IEEE (2010). doi: 10.1109\/LATINCOM.2010.5641013","DOI":"10.1109\/LATINCOM.2010.5641013"},{"issue":"1","key":"187_CR6","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/JPROC.2010.2060451","volume":"99","author":"BJ Baliga","year":"2011","unstructured":"Baliga, B.J., Ayre, R.W.A., Hinton, K., Tucker, R.S.: Green cloud computing: balancing energy in processing, storage, and transport. Proc. IEEE 99(1), 149\u2013167 (2011)","journal-title":"Proc. IEEE"},{"key":"187_CR7","doi-asserted-by":"crossref","unstructured":"Bayer, U., Kirda, E., Kruegel, C.: Improving the efficiency of dynamic malware analysis. In: Proceedings of the 2010 ACM Symposium on Applied Computing-SAC \u201910, p. 1871. ACM Press, New York (2010). doi: 10.1145\/1774088.1774484","DOI":"10.1145\/1774088.1774484"},{"issue":"6","key":"187_CR8","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MNET.2010.5634434","volume":"24","author":"T Chen","year":"2010","unstructured":"Chen, T.: Stuxnet, the real start of cyber warfare? [Editor\u2019s Note]. IEEE Netw. 24(6), 2\u20133 (2010). doi: 10.1109\/MNET.2010.5634434","journal-title":"IEEE Netw."},{"key":"187_CR9","unstructured":"Egan, G., Haley, K., Mckinney, D., Millington, T., Mulcahy, J., Parsons, T., Watson, A., Nisbet, M., Johnston, N., Hittel, S.: Internet Security Threat Report. Technical Report. April (2012)"},{"key":"187_CR10","unstructured":"Report, Emerging Cyber Threats: Georgia Tech Security Information Center. Georgia Tech Research Center Technical Report. November (2012)"},{"key":"187_CR11","doi-asserted-by":"crossref","unstructured":"Hashim, S., Jumari, K., Ismail, M.: Computer network intrusion detection software development. In: 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119), vol. 2, pp. 117\u2013123. IEEE (2000). doi: 10.1109\/TENCON.2000.892235","DOI":"10.1109\/TENCON.2000.892235"},{"key":"187_CR12","doi-asserted-by":"crossref","unstructured":"Hu, X., Chiueh, T.C., Shin, K.G.: Large-scale malware indexing using function-call graphs. In: Proceedings of the 16th ACM Conference on Computer and Communications Security-CCS \u201909, pp. 611\u2013620. ACM Press, New York (2009). doi: 10.1145\/1653662.1653736","DOI":"10.1145\/1653662.1653736"},{"issue":"4","key":"187_CR13","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11416-012-0165-0","volume":"8","author":"A Issa","year":"2012","unstructured":"Issa, A.: Anti-virtual machines and emulations. J. Comput. Virol. 8(4), 141\u2013149 (2012)","journal-title":"J. Comput. Virol."},{"key":"187_CR14","unstructured":"Kuperberg, M., Herbst, N., von Kistowski, J., Reussner, R.: Defining and Quantifying Elasticity of Resources in Cloud Computing and Scalable Platforms. Karlsruhe (2011)"},{"key":"187_CR15","doi-asserted-by":"crossref","unstructured":"Liu, S.T., Chen, Y.M.: Retrospective detection of malware attacks by cloud computing. In: 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 510\u2013517. IEEE (2010). doi: 10.1109\/CyberC.2010.99","DOI":"10.1109\/CyberC.2010.99"},{"key":"187_CR16","doi-asserted-by":"crossref","unstructured":"Martignoni, L., Paleari, R., Bruschi, D.: A framework for behavior-based malware analysis in the cloud. In. Informatica, vol. 5905, pp. 178\u2013192 (2009). doi: 10.1007\/978-3-642-10772-6_14","DOI":"10.1007\/978-3-642-10772-6_14"},{"key":"187_CR17","unstructured":"Oberheide, J., Cooke, E., Jahanian, F.: CloudAV: N-version antivirus in the network cloud. In: Proceedings of the 17th Conference on Security Symposium, pp. 91\u2013106. USENIX Association (2008)"},{"key":"187_CR18","doi-asserted-by":"crossref","unstructured":"Perdisci, R., Lanzi, A., Lee, W.: McBoost: boosting scalability in malware collection and analysis using statistical classification of executables. In: 2008 Annual Computer Security Applications Conference (ACSAC), pp. 301\u2013310. IEEE (2008). doi: 10.1109\/ACSAC.2008.22 . http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=4721567","DOI":"10.1109\/ACSAC.2008.22"},{"key":"187_CR19","unstructured":"Security, R.S.: Flamer: Highly Sophisticated and Discreet Threat Targets the Middle East (2012). http:\/\/www.symantec.com\/connect\/blogs\/flamer-highly-sophisticated-and-discreet-threat-targets-middle-east"},{"issue":"1","key":"187_CR20","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/1925861.1925869","volume":"41","author":"LM Vaquero","year":"2011","unstructured":"Vaquero, L.M., Rodero-Merino, L., Buyya, R.: Dynamically scaling applications in the cloud. ACM SIGCOMM Comput. Commun. Rev. 41(1), 45\u201352 (2011). doi: 10.1145\/1925861.1925869","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"187_CR21","volume-title":"Cloud Computing: A Practical Approach","author":"T Velte","year":"2010","unstructured":"Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing: A Practical Approach, 1st edn. McGraw-Hill, Inc., New York (2010)","edition":"1"},{"key":"187_CR22","doi-asserted-by":"crossref","unstructured":"Willems, C., Holz, T., Freiling, F.: Toward automated dynamic malware analysis using CWSandbox. IEEE Secur. Priv. Mag. 5(2), 32\u201339 (2007). doi: 10.1109\/MSP.2007.45 . http:\/\/www.computer.org\/portal\/web\/csdl\/doi\/10.1109\/MSP.2007.45","DOI":"10.1109\/MSP.2007.45"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0187-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-013-0187-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-013-0187-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:45:43Z","timestamp":1559400343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-013-0187-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,19]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["187"],"URL":"https:\/\/doi.org\/10.1007\/s11416-013-0187-2","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,19]]}}}