{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T15:29:28Z","timestamp":1773761368677,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/aina.2012.62","type":"proceedings-article","created":{"date-parts":[[2012,4,25]],"date-time":"2012-04-25T20:15:04Z","timestamp":1335384904000},"page":"8-14","source":"Crossref","is-referenced-by-count":11,"title":["Malicioius Software Detection Using Multiple Sequence Alignment and Data Mining"],"prefix":"10.1109","author":[{"given":"Yi","family":"Chen","sequence":"first","affiliation":[{"name":"Sch. of Comput. &amp; Math. Sci., Auckland Univ. of Technol., Auckland, New Zealand"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ajit","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Sch. of Comput. &amp; Math. Sci., Auckland Univ. of Technol., Auckland, New Zealand"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shaoning","family":"Pang","sequence":"additional","affiliation":[{"name":"Dept. of Comput., Unitec Inst. of Technol., Auckland, New Zealand"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ban","family":"Tao","sequence":"additional","affiliation":[{"name":"Nat. Inst. of Inf. &amp; Commun. Technol., Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Bioinformatics: Sequence and Genome Analysis","author":"Mount"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.1994.1.337"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.2006.13.1323"},{"issue":"2","key":"ref6","first-page":"405","article-title":"Detecting network intrusions by data mining and variable length sequence pattern matching","volume":"20","author":"Xinguang","year":"2009","journal-title":"J Sys Eng Electr"},{"key":"ref7","article-title":"Ten worst computer viruses of all time","author":"Strickland","year":"2011"},{"key":"ref8","volume-title":"Symantec Internet Security Threat Report: Trends for 2010","volume":"16","year":"2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3726\/978-1-4539-1868-5"},{"key":"ref10","volume-title":"Viruses and Worms Datasets collected from VX heavens"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.31979\/etd.psbe-apx4","article-title":"Pairwise Alignment of Metamorphic Computer Viruses","author":"McGhee","year":"2007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/18.suppl_1.S5"},{"key":"ref13","volume-title":"T-Coffee Multiple Sequence Alignment"},{"key":"ref14","article-title":"JCGM 200","year":"2008","journal-title":"International vocabulary of metrology - Basic and general concepts and associated terms (VIM)"},{"key":"ref15","volume-title":"Programs for Machine Learning","author":"Quinlan","year":"1993"}],"event":{"name":"2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA)","location":"Fukuoka, Japan","start":{"date-parts":[[2012,3,26]]},"end":{"date-parts":[[2012,3,29]]}},"container-title":["2012 IEEE 26th International Conference on Advanced Information Networking and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6184368\/6184848\/06184988.pdf?arnumber=6184988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:19:33Z","timestamp":1747804773000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6184988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/aina.2012.62","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}