{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-3899/paper25.html","spt.description":null,"spt.id":"Vol-3899/paper25","spt.wikidataid":null,"spt.title":"Detecting software implants using system decoys","spt.pdfUrl":"https://ceur-ws.org/Vol-3899/paper25.pdf","spt.volume":{"number":3899,"acronym":"AdvAIT 2024","wikidataid":"Q134028985","title":"Proceedings of the 1st International Workshop on Advanced Applied Information Technologies with CEUR-WS","description":"Proceedings of AdvAIT 2024 workshop","url":"http://ceur-ws.org/Vol-3899/","date":"2025-01-17","dblp":null,"k10plus":null,"urn":"urn:nbn:de:0074-3899-X"},"spt.session":null,"cvb.id":"Vol-3899/paper25","cvb.title":"Detecting software implants using system decoys","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"Dmytro Denysiuk,Oleg Savenko,Sergii Lysenko,Bohdan Savenko,Andrii Nicheporuk","cvb.vol_number":"3899","cvb.pdf_name":"paper25.pdf","cvb.pages":"277-287","cvb.fail":null,"dblp.dblp_publication_id":"https://dblp.org/rec/conf/advait/DenysiukSLSN24","dblp.dblp_proceeding_id":"https://dblp.org/rec/conf/advait/2024","dblp.volume_number":3899,"dblp.title":"Detecting software implants using system decoys.","dblp.authors":[{"dblp_author_id":"https://dblp.org/pid/65/10478","label":"Oleg Savenko","wikidata_id":null,"orcid_id":"0000-0002-4104-745X","gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/64/10477","label":"Sergiy Lysenko","wikidata_id":null,"orcid_id":"0000-0001-7243-8747","gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/268/6090","label":"Dmytro Denysiuk","wikidata_id":null,"orcid_id":null,"gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/146/2191","label":"Andrii Nicheporuk","wikidata_id":null,"orcid_id":null,"gnd_id":null},{"dblp_author_id":"https://dblp.org/pid/200/5930","label":"Bohdan Savenko","wikidata_id":null,"orcid_id":null,"gnd_id":null}],"dblp.pdf_id":"Vol-3899/paper25"}