{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:46:18Z","timestamp":1759178778275},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_20","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"256-269","source":"Crossref","is-referenced-by-count":18,"title":["From NLP (Natural Language Processing) to MLP (Machine Language Processing)"],"prefix":"10.1007","author":[{"given":"Peter","family":"Teufl","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Udo","family":"Payer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guenter","family":"Lackner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-03781-8_13","volume-title":"Electronic Participation","author":"P. Teufl","year":"2009","unstructured":"Teufl, P., Payer, U., Parycek, P.: Automated analysis of e-participation data by utilizing associative networks, spreading activation and unsupervised learning. In: Macintosh, A., Tambouris, E. (eds.) Electronic Participation. LNCS, vol.\u00a05694, pp. 139\u2013150. Springer, Heidelberg (2009)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/11560326_38","volume-title":"Computer Network Security","author":"U. Payer","year":"2005","unstructured":"Payer, U., Teufl, P., Kraxberger, S., Lamberger, M.: Massive data mining for polymorphic code detection. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, vol.\u00a03685, pp. 448\u2013453. Springer, Heidelberg (2005)"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11506881_2","volume-title":"Intrusion and Malware Detection and Vulnerability Assessment","author":"U. Payer","year":"2005","unstructured":"Payer, U., Teufl, P., Lamberger, M.: Hybrid engine for polymorphic code detection. In: Julisch, K., Kr\u00fcgel, C. (eds.) DIMVA 2005. LNCS, vol.\u00a03548, pp. 19\u201331. Springer, Heidelberg (2005)"},{"key":"20_CR4","unstructured":"SunbeltSoftware (Cwsandbox - automatic behavior analysis of malware)"},{"key":"20_CR5","unstructured":"Norman, Norman sandbox: A virtual environment where programs may perform in safe surroundings"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Vasudevan, A., Yerraballi, R.: Cobra: Fine-grained malware analysis using stealth localized-executions. In: IEEE Symposium on Security and Privacy, pp. 264\u2013279 (2006)","DOI":"10.1109\/SP.2006.9"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D. Song","year":"2008","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: Bitblaze: A new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 1\u201325. Springer, Heidelberg (2008)"},{"key":"20_CR8","unstructured":"Microsoft, Natural language processing group: Redmond-based natural language processing group"},{"key":"20_CR9","unstructured":"Stanford, Natural language processing group: Natural language processing group at stanford university"},{"key":"20_CR10","unstructured":"Alias-i, Lingpipe: A suite of java libraries for the linguistic analysis of human language"},{"key":"20_CR11","unstructured":"Tsatsaronis, G., Vazirgiannis, M., Androutsopoulos, I.: Word sense disambiguation with spreading activation networks generated from thesauri. In: Veloso, M.M. (ed.) IJCAI 2007 (2007)"},{"key":"20_CR12","volume-title":"Semantic memory","author":"M.R. Quillian","year":"1968","unstructured":"Quillian, M.R.: Semantic memory. MIT Press, Cambridge (1968)"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1023\/A:1006569829653","volume":"11","author":"F. Crestani","year":"1997","unstructured":"Crestani, F.: Application of spreading activation techniques in information retrieval. Artificial Intelligence Review\u00a011, 453\u2013482 (1997)","journal-title":"Artificial Intelligence Review"},{"key":"20_CR14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","volume-title":"WordNet: An Electronic Lexical Database (Language, Speech, and Communication)","author":"C. Fellbaum","year":"1998","unstructured":"Fellbaum, C.: WordNet: An Electronic Lexical Database (Language, Speech, and Communication). The MIT Press, Cambridge (1998)"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Kozima, H.: Similarity between words computed by spreading activation on an english dictionary. In: EACL, pp. 232\u2013239 (1993)","DOI":"10.3115\/976744.976772"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/S0893-6080(04)00166-2","volume":"17","author":"A.K. Qin","year":"2004","unstructured":"Qin, A.K., Suganthan, P.N.: Robust growing neural gas algorithm with application in cluster analysis. Neural Netw.\u00a017, 1135\u20131148 (2004)","journal-title":"Neural Netw."},{"key":"20_CR17","first-page":"3","volume-title":"Advances in Neural Information Processing Systems (NIPS)","author":"D. Klein","year":"2002","unstructured":"Klein, D., Manning, C.D.: Fast exact inference with a factored model for natural language parsing. In: Advances in Neural Information Processing Systems (NIPS), vol.\u00a015, pp. 3\u201310. MIT Press, Cambridge (2002)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:36:32Z","timestamp":1619786192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}