{"id":"https://openalex.org/W1506798384","doi":"https://doi.org/10.1007/3-540-48970-3_17","title":"Companion Viruses and the Macintosh: Threats and Countermeasures","display_name":"Companion Viruses and the Macintosh: Threats and Countermeasures","publication_year":1999,"publication_date":"1999-01-01","ids":{"openalex":"https://openalex.org/W1506798384","doi":"https://doi.org/10.1007/3-540-48970-3_17","mag":"1506798384"},"language":"en","primary_location":{"id":"doi:10.1007/3-540-48970-3_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-48970-3_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000626132","display_name":"Jeffrey Horton","orcid":null},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Jeffrey Horton","raw_affiliation_strings":["Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Northfields Avenue, Wollongong"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Northfields Avenue, Wollongong","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073611240","display_name":"Jennifer Seberry","orcid":"https://orcid.org/0000-0002-9558-4293"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jennifer Seberry","raw_affiliation_strings":["Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Northfields Avenue, Wollongong","School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, 2522, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Centre for Computer Security Research School of Information Technology and Computer Science, University of Wollongong, Northfields Avenue, Wollongong","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000626132"],"corresponding_institution_ids":["https://openalex.org/I204824540"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12719298,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"202","last_page":"212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8357254266738892},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.5946682691574097},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48902663588523865},{"id":"https://openalex.org/keywords/style","display_name":"Style (visual arts)","score":0.4148043990135193},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.061619728803634644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8357254266738892},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.5946682691574097},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48902663588523865},{"id":"https://openalex.org/C2776445246","wikidata":"https://www.wikidata.org/wiki/Q1792644","display_name":"Style (visual arts)","level":2,"score":0.4148043990135193},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.061619728803634644},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/3-540-48970-3_17","is_oa":false,"landing_page_url":"https://doi.org/10.1007/3-540-48970-3_17","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W142093346","https://openalex.org/W1537067540","https://openalex.org/W1984577341","https://openalex.org/W1990150586","https://openalex.org/W1992572515","https://openalex.org/W2032674030","https://openalex.org/W2316465199","https://openalex.org/W4250968676"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2356229341","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W2048370938"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-05-09T06:09:20.037420","created_date":"2025-10-10T00:00:00"}
