{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:26:04Z","timestamp":1725639964898},"publisher-location":"Dordrecht","reference-count":6,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400729100"},{"type":"electronic","value":"9789400729117"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-94-007-2911-7_58","type":"book-chapter","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T10:47:44Z","timestamp":1323168464000},"page":"601-605","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of Malware Attached in Spam"],"prefix":"10.1007","author":[{"given":"Eul Gyu","family":"Im","sequence":"first","affiliation":[]},{"given":"Kyoung-Soo","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,12,7]]},"reference":[{"key":"58_CR1","volume-title":"The art of computer virus research and defense","author":"P Szor","year":"2005","unstructured":"Szor P (2005) The art of computer virus research and defense. Addison Wesley Professional, Reading"},{"issue":"1","key":"58_CR2","first-page":"93","volume":"19","author":"K Yang","year":"2009","unstructured":"Yang K, Lee S, Park W, Park K, Lim J (2009) A study on the analysis and detection method for protecting malware spreading via E-mail. J KIISC 19(1):93\u2013101","journal-title":"J KIISC"},{"key":"58_CR3","unstructured":"Honeynet Project. \u201cKnow Your Enemy: Honeynets.\u201d available at http:\/\/www.honeynet.org\/papers\/honeynet"},{"key":"58_CR4","unstructured":"Miao Q, Wang Y, Cao Y, Zhang X, Liu Z (2010) APICapture\u2014a tool for monitoring the behavior of malware. In: Proceedings of the 3rd international conference on advanced computer theory and engineering, pp 390\u2013394"},{"key":"58_CR5","doi-asserted-by":"crossref","unstructured":"Nair VP, Jain H, Golecha YK, Gaur MS, Laxmi V (2010) MEDUSA: MEtamorphic malware dynamic analysis using signature from API. In: Proceedings of the 3rd international conference on security of information and networks, pp 263\u2013269","DOI":"10.1145\/1854099.1854152"},{"key":"58_CR6","unstructured":"Han KS, Im EG (2010) The Analysis of Malware Propagated through Spam. In: Proceedings of the 2010 winter conference of Korea information and communications society"}],"container-title":["Lecture Notes in Electrical Engineering","Proceedings of the International Conference on IT Convergence and Security 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-2911-7_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T13:42:31Z","timestamp":1686490951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-94-007-2911-7_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,7]]},"ISBN":["9789400729100","9789400729117"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-2911-7_58","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2011,12,7]]}}}