{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期部分”:[2022,4,5]],“日期时间”:“2022-04-05T01:56:48Z”,“时间戳”:1649123808646},“出版商位置”:“查姆”,“参考计数”:22,“出版者”:“斯普林格国际出版公司”,“isbn-type”:[{“值”:“9783319597669”,“类型”:”打印“},{“值”:“9783319597676”,“type”:“electronic”}],“license”:[{“start”:{“date parts”:[[2017,1,1]],“date time”:“2017-01-01T00:00:00Z”,“timestamp”:1483228800000},“content version”:“unspecified”,“delay in days”:0,“URL”:“http:\/\/wspringer.com\/tdm”}],“content domain”:{“domain”:[],“crosmark restriction”:false},“short container title”:[],“published print”:{“date parts”:[[2017]]},“DOI”:“10.1007\/978-3-319-59767-6_12”,“type”:“book-chapter”,“created”:{“date-parts”:[[2017,5,29]],“date-time”:“2017-05-29T03:44:19Z”,“timestamp”:1496029459000},“page”:”144-153“,”source“:”Crossref“,“is-referenced-by-count”:0,“title”:[“The Possibilities of System\u2019s Self-defense Against Malicious Software”],“prefix”:“10.1007”,“作者”:[{“given”:“Miros\u0142aw”,“family”:“Skrzewski”,“sequence”:“first”,“affiliation”:[]},{“given”:“Pawe\u0142”,“家族”:“Rybka”,“序列”:“additional”,“从属”:[]},“成员”:“297”,“published-online”:{“date-parts”:[[2017,5,30]]}:“Dasgupta,D.:用于网络防御的免疫激发自主系统。\nhttp:\/\/citeserx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.372.164&rep=rep.1&type=pdf”},{“key”:“12_CR2”,“unstructured”:“Sterritt,R.,Hinchey,M.:多智能体系统中自主自我保护的生物启发概念。\nhttp:\/\/uir.ulster.ac.uk\/2579\/1\/sasemas-Sterritt-Hinchey-book-finalv3.pdf”},{“key”:“12_CR3”,“doi-asserted-by”:“crossref”,“first page”:imont“,”年份“:”2012“,“非结构化”:“Hagimont,D.,Boyer,F.,Broto,L.,De Palma,N.:集群分布式系统中的自我保护。IEEE Trans.Parallel Distribute.Syst.23,330\u2013336(2012)”,“日志标题”:“IEEE Trans.Parallel distribute.Syst.”},{“key”:“12_CR4”,“非结构性”:“Riden,J.,Seifert,C.:不同种类的蜜罐指南。\nhttps://www.symantec.com/connect//articles \/Guide-difference-Kinds-Honeypots”},{“key”:“12_CR5”,“series-title”:“计算机和信息科学中的通信”,“doi-asserted-by”:“publisher”,“first page”:”118“,“doi”:“10.1007\/978-319-39207-3_11”,“volume-title”:“Computer Networks”,“author”:“T Sochor”,“year”:“2016”,“unstructured”:“Sochor,T.,Zuzcak,M.:近期来看的高交互linux蜜罐体系结构。收录:Gaj,P.,Kwiecie\u0144,A.,Stera,P.(eds.)CN 2016。CCIS,第608卷,第118页\u2013131。查姆施普林格(2016)。doi:\n10.1007\/978-3-319-39207-3_11“},{“key”:“12_CR6”,“unstructured”:“Zeltser,L.:SSH、Web和恶意软件攻击的专用蜜罐。\nhttps:\/\/Zeltser.com/Honeypots-for-Malware-sh-Web-Attacks\/”},}“key:”12_CR7“,”series-title“:”计算机和信息科学中的通信“,”doi-asserted-by“:”publisher“,”first page“:”271“,”doi“:“”10.1007\/978-3-642-21771-5_29“,“volume-title”:“Computer Networks”,“author”:“M Skrzewski”,“year”:“2011”,“unstructured”:“Skrzewski,M.:基于流的恶意软件流量检测算法。收录:Kwiecie\u0144,A.,Gaj,P.,Stera,P.(编辑)CN 2011。CCIS,第160卷,第271\u2013280页。斯普林格,海德堡(2011)。doi:\n10.1007\/978-3642-21771-5_29“},{“key”:“12_CR8”,“unstructured”:“Shevchenko,A.:恶意软件中自卫技术的演变。\nhttps:\/\/securelist.com\/analysis\/publications\/36156\/The-evolution-of-self-defense-technologies-in-malware\/”}10.1142\/S0218126613500709“,”卷“:”22“,”作者“:”R Cupek“,”年份“:”2013“,”非结构化“:”Cupek,R.,Ziebinski,A.,Franek,M.:基于FPGA的OPC UA嵌入式工业数据服务器实现。J.循环。系统。计算。22,1350070(2013)“,“新闻标题”:“J.Circ。系统。计算。“},{”key“:”12_CR10“,”series-title“:”Communications in Computer and Information Science“,”doi-asserted-by“:”publisher“,”first page“:“69”,”doi“:”10.1007\/978-3319-19419-6_7“,”volume-title“:“Computer Networks”,”author“:”T Sochor“,”year“:”2015“,”unstructured“:”Sochor,T.,Zuzcak,M.:蜜罐和蜜网在互联网威胁检测中的吸引力研究。收录人:Gaj,P.,Kwiecie\u0144,A.,Stera,P.(eds.)CN 2015。CCIS,第522卷,第69\u201381页。查姆施普林格(2015)。doi:\n10.1007\/978-3-319-19419-6_7“},{“key”:“12_CR11”,“series-title”:“Communications in Computer and Information Science”,“doi-asserted-by”:“publisher”,“first page”:”138“,“doi”:“10.1007\/978-3-319-07941-7_14”,“volume-title”:”Computer Networks“,“author”:“M Skrzewski”,“year”:“2014”,“unstructured”:“Skrzewski,M.:用于恶意软件威胁检测的系统网络活动监控。收录人:Kwiecie\u0144,A.,Gaj,P.,Stera,P.(编辑)CN 2014。CCIS,第431卷,第138\u2013146页。查姆施普林格(2014)。doi:\n10.1007\/978-3-319-07941-7_14“},{“key”:“12_CR12”,“series-title”:“计算机科学讲义”,“doi-asserted-by”:“publisher”,“首页”:“135”,“doi”:“10.1007\/978-3-319-45246-3_13”,“volume-title”:”计算集体智能“,“author”:“A Ziebinski”,“year”:“2016”,“unstructured”:“Ziebinski,A.,Cupek,R.,Erdogan,H.,Waechter,S.:ADAS技术对传感器融合未来前景的调查。收录人:Nguyen,N.-T.,Manolopoulos,Y.,Iliadis,L.,Trawi\u0144ski,B.(编辑)ICCCI 2016。LNCS,第9876卷,第135页\u2013146。查姆施普林格(2016)。doi:\n10.1007\/978-3-319-45246-3_13“},{“key”:“12_CR13”,“unstructured”:“ARGUS-审核网络活动。\nhttp://qosient.com/ARGUS\/”},}“key:”12_CR14“,”unstructure“:”捕获BAT.\nhttp://www.honeynet.org\/project\/CaptureBAT“}\\/Dionaea.carinore.it“},{”key“:”12_CR16“,”非结构化“:”https:\/\/www.honeynet.org\/project“},{“key”:“12_CR17”,“unstructured”:“Etherape,图形化网络监视器。\nhttp:\/\/Etherape.sourceforge.net\/”},}“密钥”:“12 _CR18”,“非结构化”:“Regshot.\nhttps:\//\sourceforge.net \/process\/Regshot\/files\/reghot\/“}”,{”key“:”12_CR19“,“非结构性”:“Windows Sysinternals。\nhttps:\/\/technet.microsoft.com/en-us\/sysinternals“},{“key”:“12_CR20”,“unstructured”:“AFICK(另一个文件完整性检查码)。\nhttp:\/\\/AFICK.sourceforge.net\/”},}“key”:”12_CR21“,”unstructure“:”Win32的GNU实用程序。\nhttp:\/\/unxutils.sourceforge.net\/“},{“key”:“12_CR22”,“unstructured”:“GitHub ytisf\/theZoo存储库。\nhttps:\/\/GitHub.com/ytisf\/theZoo\/tree\/master\/恶意软件\/Binaries”}],“container-title”:[“计算机网络”,“计算机和信息科学中的通信”],“原始标题”:[],“链接”:[{“URL”:“http:\/\/link.springer.com/content\/pdf\/10.1007\/978-3-319-59767-6_12“,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[[2017,5,29]],“date-time”:”2017-05-29T03:48:43Z“,“timestamp”:1496029723000},“score”:1,“resource”:{“primary”:{“URL”:“http://\/link.springer.com/10.1007\/978-3-319-59767-6_12“}},”副标题“:[],”短标题“:[],”已发布“:{”日期-部件“:[[2017]]},“ISBN”:[“9783319597669”,“978332959767676”],”引用计数“:22,”URL“:”http://\/dx.doi.org\/10.1007\/9783-319-59767-6_12“,”关系“:{}”,“ISS N“:[”1865-0929“,”1865-0.937“],“ISSN-type”:[{“value”:“1865-0929',”type“:”print“},{“value“:“1865-0937”,“type”:“electronic”}],“subject”:[],“published”:{“date-parts”:[[2017]]}}