{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:52:30Z","timestamp":1742932350562,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":11,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_848","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:53:32Z","timestamp":1319723612000},"page":"751-752","source":"Crossref","is-referenced-by-count":2,"title":["Malware Behavior Clustering"],"prefix":"10.1007","author":[{"given":"Engin","family":"Kirda","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"848_CR1_848","unstructured":"Brumley D, Hartwig C, Liang Z, Newsome J, Poosankam P, Song D, Yin H (2007) Automatically identifying trigger-based behavior in Malware. In: Lee W et al. (eds) Botnet analysis and defense"},{"key":"848_CR2_848","volume-title":"Dynamic spyware analysis","author":"M Egele","year":"2007","unstructured":"Egele M, Kruegel C, Kirda E, Yin H, Song D (2007) Dynamic spyware analysis. In: USENIX annual technical conference, Santa Clara, 2007"},{"key":"848_CR3_848","volume-title":"Exploring multiple execution paths for malware analysis","author":"A Moser","year":"2007","unstructured":"Moser A, Kruegel C, Kirda E (2007) Exploring multiple execution paths for malware analysis. In: IEEE symposium on security and privacy, Berkeley, 2007"},{"key":"848_CR4_848","volume-title":"An automated virus classification system","author":"M Gheorghescu","year":"2005","unstructured":"Gheorghescu M (2005) An automated virus classification system. In: Virus bulletin conference, Dublin, 2005"},{"key":"848_CR5_848","first-page":"2721","volume":"7","author":"JZ Kolter","year":"2006","unstructured":"Kolter JZ, Maloof MA (2006) Learning to detect and classify malicious executables in the wild. J Mach Learn Res 7:2721\u20132744","journal-title":"J Mach Learn Res"},{"key":"848_CR6_848","unstructured":"Dullien T, Rolles R (2005) Graph-based comparison of executable objects. In: Symposium sur la S\u00e9curit\u00e9 des Technologies de l\u2019Information et des Communications (SSTIC), Rennes, 2005"},{"key":"848_CR7_848","unstructured":"Holz T, Willems C, Rieck K, Duessel P, Laskov P (2008) Learning and classification of malware behavior. In: Fifth conference on detection of intrusions and malware and vulnerability assessment (DIMVA 08), Paris, 2008"},{"key":"848_CR8_848","volume-title":"Mody JJ (2006) Behavioral classification","author":"T Lee","year":"2006","unstructured":"Lee T, Mody JJ (2006) Behavioral classification. In: EICAR conference, Hamburg, 2006"},{"key":"848_CR9_848","doi-asserted-by":"crossref","unstructured":"Bailey M, Oberheide J, Andersen J, Mao ZM, Jahanian F, Nazario J (2007) Automated classification and analysis of internet malware. In: 10th international symposium on recent advances in intrusion detection (RAID\u201907), Gold Coast, 2007","DOI":"10.1007\/978-3-540-74320-0_10"},{"key":"848_CR10_848","volume-title":"SGNET: a worldwide deployable framework to support the analysis of malware threat models","author":"C Leita","year":"2008","unstructured":"Leita C, Dacier M (2008) SGNET: a worldwide deployable framework to support the analysis of malware threat models. In: European dependable computing conference, Kaunas, 2008"},{"key":"848_CR11_848","unstructured":"Bayer U, Milani P, Hlauschek C, Kruegel C, Kirda E (2009) Scalable, behavior-based malware clustering. In: 16th annual network and distributed system security symposium (NDSS 2009), San Diego, 2009"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T23:58:44Z","timestamp":1591055924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_848","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}