{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:52:32Z","timestamp":1771699952958,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642337031","type":"print"},{"value":"9783642337048","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33704-8_20","type":"book-chapter","created":{"date-parts":[[2012,10,9]],"date-time":"2012-10-09T09:12:43Z","timestamp":1349773963000},"page":"226-239","source":"Crossref","is-referenced-by-count":12,"title":["Malware Characterization Using Behavioral Components"],"prefix":"10.1007","author":[{"given":"Chaitanya","family":"Yavvari","sequence":"first","affiliation":[]},{"given":"Arnur","family":"Tokhtabayev","sequence":"additional","affiliation":[]},{"given":"Huzefa","family":"Rangwala","sequence":"additional","affiliation":[]},{"given":"Angelos","family":"Stavrou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, M., Jahanian, F., Nazario, J.: Automated Classification and Analysis of Internet Malware (2007)"},{"key":"20_CR2","unstructured":"Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, Behavior-Based Malware Clustering. In: NDSS (2009)"},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2089125.2089126","volume":"44","author":"M. Egele","year":"2008","unstructured":"Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv.\u00a044(2), 6:1\u20136:42 (2008)","journal-title":"ACM Comput. Surv."},{"key":"20_CR4","unstructured":"Falliere, N., Murchu, L.O., Chien, E.: W32.stuxnet dossier, White paper (2011), \n                    \n                      www.symantec.com"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Gusfield, D.: Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology. Cambridge University Press (1997)","DOI":"10.1017\/CBO9780511574931"},{"key":"20_CR6","unstructured":"IOActive. Reversal and Analysis of Zeus and SpyEye Banking Trojans. Technical report, IOActive (2012)"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11416-008-0086-0","volume":"4","author":"G. Jacob","year":"2008","unstructured":"Jacob, G., Debar, H., Filiol, E.: Behavioral detection of malware: from a survey towards an established taxonomy. Journal in Computer Virology\u00a04, 251\u2013266 (2008), doi:10.1007\/s11416-008-0086-0","journal-title":"Journal in Computer Virology"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Jang, J., Brumley, D., Venkataraman, S.: Bitshred: feature hashing malware for scalable triage and semantic analysis. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 309\u2013320. ACM (2011)","DOI":"10.1145\/2046707.2046742"},{"key":"20_CR9","unstructured":"The flame: Questions and answers (May 2012), \n                    \n                      www.securelist.com"},{"key":"20_CR10","unstructured":"New malware classification system, \n                    \n                      www.securelist.com\n                    \n                    \n                   (accessed, June 2012)"},{"key":"20_CR11","unstructured":"Rules for naming detected objects, \n                    \n                      www.securelist.com\n                    \n                    \n                   (accessed, 2012)"},{"key":"20_CR12","unstructured":"Kirillov, I., Beck, D., Chase, P., Martin, R.: Malware attribute enumeration and characterization"},{"issue":"5","key":"20_CR13","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/bioinformatics\/btm563","volume":"24","author":"P. Langfelder","year":"2008","unstructured":"Langfelder, P., Zhang, B., Horvath, S.: Defining clusters from a hierarchical cluster tree: the dynamic tree cut package for r. Bioinformatics\u00a024(5), 719\u2013720 (2008)","journal-title":"Bioinformatics"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-642-15512-3_13","volume-title":"Recent Advances in Intrusion Detection","author":"P. Li","year":"2010","unstructured":"Li, P., Liu, L., Gao, D., Reiter, M.K.: On Challenges in Evaluating Malware Clustering. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 238\u2013255. Springer, Heidelberg (2010)"},{"issue":"4","key":"20_CR15","doi-asserted-by":"crossref","first-page":"639","DOI":"10.3233\/JCS-2010-0410","volume":"19","author":"K. Rieck","year":"2011","unstructured":"Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. Journal of Computer Security\u00a019(4), 639\u2013668 (2011)","journal-title":"Journal of Computer Security"},{"key":"20_CR16","unstructured":"RSA. The Current State of Cybercrime and What to Expect in 2012. Technical report, RSA (2012)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Trinius, P., Holz, T., Gobel, J., Freiling, F.C.: Visual analysis of malware behavior using treemaps and thread graphs. In: 2009 6th International Workshop on Visualization for Cyber Security, 33\u201338 (2009)","DOI":"10.1109\/VIZSEC.2009.5375540"},{"key":"20_CR18","unstructured":"Ukkonen, E.: Constructing suffix trees on-line in linear time. In: IFIP Congress (1), pp. 484\u2013492 (1992)"},{"issue":"4","key":"20_CR19","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11416-007-0074-9","volume":"4","author":"G. Wagener","year":"2007","unstructured":"Wagener, G., State, R., Dulaunoy, A.: Malware behaviour analysis. Journal in Computer Virology\u00a04(4), 279\u2013287 (2007)","journal-title":"Journal in Computer Virology"},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/1835804.1835820","volume-title":"Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010","author":"Y. Ye","year":"2010","unstructured":"Ye, Y., Li, T., Chen, Y., Jiang, Q.: Automatic malware categorization using cluster ensemble. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, pp. 95\u2013104. ACM, New York (2010)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33704-8_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:19:29Z","timestamp":1620116369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33704-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642337031","9783642337048"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33704-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}