{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:26Z","timestamp":1725541586789},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_18","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"140-147","source":"Crossref","is-referenced-by-count":5,"title":["Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code"],"prefix":"10.1007","author":[{"given":"Tie-Ming","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lie-hui","family":"Jiang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hong-qi","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ji-zhong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xian","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Alias, C.: Program Optimization by Template Recognition and Replacement. University of Versailles Saint-Quentin (2005)"},{"key":"18_CR2","volume-title":"Automatic Algorithm Recognition and Replacement","author":"R. Metzger","year":"2003","unstructured":"Metzger, R.: Automatic Algorithm Recognition and Replacement. MIT, Cambridge (2003)"},{"issue":"20","key":"18_CR3","first-page":"159","volume":"34","author":"J.-z. Li","year":"2008","unstructured":"Li, J.-z., Jiang, L.-h., Yin, Q.: Cryptogram Algorithm Recognition Technology Based on Bayes Decision-making. Computer Engineering\u00a034(20), 159\u2013163 (2008)","journal-title":"Computer Engineering"},{"key":"18_CR4","unstructured":"Jin, Q., Wu, G.-x., Li, D.: Research of anti-virus engine and automatic extraction of computer virus signatures. Computer Engineering and Design\u00a028(24) (2007)"},{"key":"18_CR5","volume-title":"Principle of Compiling","author":"H.-w. Chen","year":"2000","unstructured":"Chen, H.-w., Liu, C.-l.: Principle of Compiling. National Defense Industry Press, Beijing (2000)"},{"key":"18_CR6","unstructured":"Cifuentes, C.: Reverse Compilation Techniques. Queensland University (1994)"},{"key":"18_CR7","volume-title":"Applied Cryptography","author":"S.-z. Wu","year":"2000","unstructured":"Wu, S.-z., Zhu, S.-x.: Applied Cryptography. China Machine Press, Beijing (2000)"},{"key":"18_CR8","unstructured":"Harvey, I.: Cipher Hunting: How To Find Cryptographic Algorithms In Large Binaries. nCipher Corporation Ltd. (2001)"},{"key":"18_CR9","volume-title":"Pattern Classification","author":"H.-d. Li","year":"2003","unstructured":"Li, H.-d., Yao, T.-x.: Pattern Classification. China Machine Press, Beijing (2003)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:37:58Z","timestamp":1558388278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}