{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:39:03Z","timestamp":1777613943842,"version":"3.51.4"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319261898","type":"print"},{"value":"9783319261904","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26190-4_28","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T11:03:05Z","timestamp":1445857385000},"page":"415-430","source":"Crossref","is-referenced-by-count":13,"title":["Analyzing File-to-File Relation Network in Malware Detection"],"prefix":"10.1007","author":[{"given":"Lingwei","family":"Chen","sequence":"first","affiliation":[]},{"given":"William","family":"Hardy","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,25]]},"reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-74320-0_10","volume-title":"Recent Advances in Intrusion Detection","author":"M Bailey","year":"2007","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178\u2013197. Springer, Heidelberg (2007)"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Chau, D., Nachenberg, C., Wilhelm, J., Wright, A., Faloutsos, C.: Polonium: tera-scale graph mining for malware detection. In: SIAM International Conference on Data Mining (SDM), pp. 131\u2013142 (2011)","DOI":"10.1137\/1.9781611972818.12"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Chen, L., Li, T., Abdulhayoglu, M., Ye, Y.: Intelligent malware detection based on file relation graphs. In: 9th IEEE International Conference on Sematic Computing, pp. 85\u201392 (2015)","DOI":"10.1109\/ICOSC.2015.7050784"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Chen, K., Zhu, P., Xiong, Y.: Mining spam accounts with user influence. In: International Conference on ISCC-C, pp. 167\u2013173 (2013)","DOI":"10.1109\/ISCC-C.2013.85"},{"key":"28_CR5","unstructured":"Computer Security Institute: 12th annual edition of the CSI computer crime and security survey. Technical report, Computer Security Institute (2007)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Diestel, R.: Graph Theory, vol. 173, 4th edn. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14279-6"},{"issue":"2","key":"28_CR7","first-page":"6:1","volume":"44","author":"M Egele","year":"2008","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware analysis techniques and tools. ACM CSUR 44(2), 6:1\u20136:42 (2008)","journal-title":"ACM CSUR"},{"issue":"1","key":"28_CR8","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11416-006-0026-9","volume":"3","author":"E Filiol","year":"2007","unstructured":"Filiol, E., Jacob, G., Liard, M.L.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. J. Comput. Virol 3(1), 27\u201337 (2007)","journal-title":"J. Comput. Virol"},{"key":"28_CR9","unstructured":"Hu, X., Tang, J., Zhang, Y., Liu, H.: Social spammer detection in microblogging. In: Proceedings of the 23rd IJCAI, pp. 2633\u20132639 (2013)"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37300-8_1","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"N Karampatziakis","year":"2013","unstructured":"Karampatziakis, N., Stokes, J.W., Thomas, A., Marinescu, M.: Using file relationships in malware classification. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 1\u201320. Springer, Heidelberg (2013)"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Kephart, J., Arnold, W.: Automatic extraction of computer virus signatures. In: Proceedings of 4th Virus Bulletin International Conference, pp. 178\u2013184 (1994)","DOI":"10.1016\/0142-0496(94)90045-0"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Lin, C., Zhou, Y., Chen, K., He, J., Yang, X., Song, L.: Analysis and identification of spamming behaviors in Sina Weibo microblog. In: SNAKDD 2013 (2013)","DOI":"10.1145\/2501025.2501035"},{"issue":"3","key":"28_CR13","first-page":"16:1","volume":"2","author":"MM Masud","year":"2008","unstructured":"Masud, M.M., Al-Khateeb, T.M., Hamlen, K.W., Gao, J., Khan, L., Han, J., Thuraisingham, B.: Cloud-based malware detection for evolving data streams. ACM TMIS 2(3), 16:1\u201316:27 (2008)","journal-title":"ACM TMIS"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM, pp. 29\u201342 (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"28_CR15","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-12035-0_21","volume-title":"Information Systems, Technology and Management","author":"T-S Moh","year":"2010","unstructured":"Moh, T.-S., Murmann, A.J.: Can you judge a man by his friends? Enhancing spammer detection on the twitter microblogging platform using friends and followers. In: Prasad, S.K., Vin, H.M., Sahni, S., Jaiswal, M.P., Thipakorn, B. (eds.) ICISTM 2010. CCIS, vol. 54, pp. 210\u2013220. Springer, Heidelberg (2010)"},{"issue":"1","key":"28_CR16","first-page":"2799","volume":"14","author":"N Noorshams","year":"2013","unstructured":"Noorshams, N., Wainwright, M.J.: Belief propagation for continuous state spaces: stochastic message-passing with quantitative guarantees. J. Mach. Learn. Res. 14(1), 2799\u20132835 (2013)","journal-title":"J. Mach. Learn. Res."},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Park, Y., Zhang, Q., Reeves, D., Mulukutla, V.: AntiBot: clustering common semantic patterns for bot detection. In: IEEE 34th Annual Computer Software and Applications Conference, pp. 262\u2013272 (2010)","DOI":"10.1109\/COMPSAC.2010.33"},{"key":"28_CR18","volume-title":"Social Networks Analysis: A Hand Book","author":"J Scott","year":"2000","unstructured":"Scott, J.: Social Networks Analysis: A Hand Book, 2nd edn. SAGE Publications Ltd, Thousand Oaks (2000)","edition":"2"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Sung, A., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables (save). In: Proceedings of the 20th ACSAC, pp. 326\u2013334 (2004)","DOI":"10.1109\/CSAC.2004.37"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Tang, R., Lu, L., Zhuang, Y., Fong, S.: Not every friend on a social network can be trusted: an online trust indexing algorithm. In: IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT), pp. 280\u2013285 (2012)","DOI":"10.1109\/WI-IAT.2012.84"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Ting, I.H., Wang, S.L.: Content matters: a study of hate groups detection based on social networks analysis and web mining. In: IEEE\/ACM ASONAM, pp. 1196\u20131201 (2013)","DOI":"10.1145\/2492517.2500254"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Tamersoy, A., Roundy, K.A., Chau, D.: Guilt by association: large scale malware detection by mining file-relation graphs. In: ACM SIGKDD (2014)","DOI":"10.1145\/2623330.2623342"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Weng, J., Lim, E.P., Jiang, J., He, Q.: Twitterrank: finding topic-sensitive influential twitterers. In: Proceedings of the Third ACM WSDM, pp. 261\u2013270 (2010)","DOI":"10.1145\/1718487.1718520"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R.C., Gu, G.: Die free or live hard? Empirical evaluation and new design for fighting evolving twitter spammers. In: Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, pp. 318\u2013337 (2011)","DOI":"10.1007\/978-3-642-23644-0_17"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Yang, C., Harkreader, R., Zhang, J., Shin, S., Gu, G.: Analyzing spammer\u2019s social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st International Conference on World Wide Web (WWW 2012), pp. 71\u201380 (2012)","DOI":"10.1145\/2187836.2187847"},{"key":"28_CR26","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11416-008-0082-4","volume":"4","author":"Y Ye","year":"2008","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D., Jiang, Q.: An intelligent PE-malware detection system based on association mining. J. Comput. Virol. 4, 323\u2013334 (2008)","journal-title":"J. Comput. Virol."},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Ye, Y., Wang, D., Li, T., Ye, D.: IMDS: Intelligent malware detection system. In: Proceedings of the 13th ACM SIGKDD, pp. 1043\u20131047 (2007)","DOI":"10.1145\/1281192.1281308"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, T., Zhu, S., Zhuang, W., Tas, E., Gupta, U., Abdulhayoglu, M.: Combining file content and file relations for cloud based malware detection. In: Proceedings of the 17th ACM SIGKDD, pp. 222\u2013230 (2011)","DOI":"10.1145\/2020408.2020448"},{"key":"28_CR29","unstructured":"Yedidia, J. S., Freeman, W.T., Weiss, Y.: Understanding belief propagation and its generalizations. Mltsubishl Electric Research Laboratories (2001)"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, C., Niu, K., He, Z.: Dynamic detection of spammers in Weibo. In: 4th IEEE IC-NIDC, pp. 112\u2013116 (2014)","DOI":"10.1109\/ICNIDC.2014.7000276"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26190-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:23:24Z","timestamp":1748665404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26190-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261898","9783319261904"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26190-4_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}