{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:38:50Z","timestamp":1777613930695,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642372995","type":"print"},{"value":"9783642373008","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37300-8_1","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T08:53:59Z","timestamp":1363164839000},"page":"1-20","source":"Crossref","is-referenced-by-count":11,"title":["Using File Relationships in Malware Classification"],"prefix":"10.1007","author":[{"given":"Nikos","family":"Karampatziakis","sequence":"first","affiliation":[]},{"given":"Jack W.","family":"Stokes","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Mady","family":"Marinescu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Andoni, A., Indyk, P.: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006, pp. 459\u2013468. IEEE (2006)","DOI":"10.1109\/FOCS.2006.49"},{"key":"1_CR2","unstructured":"Bayer, U., Kruegel, C., Kirda, E.: TTAnalyze: A tool for analyzing malware. In: Proceedings of 15th Annual Conference of the European Institute for Computer Antivirus Research, EICAR (2006)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Chau, D., Nachenberg, C., Wilhelm, J., Wright, A., Faloutsos, C.: Polonium: Tera-scale graph mining and inference for malware detection. In: Proceedings of SIAM International Conference on Data Mining, SDM 2011 (2011)","DOI":"10.1137\/1.9781611972818.12"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Chouchane, M., Walenstein, A., Lakhotia, A.: Statistical signatures for fast filtering of instruction-substituting metamorphic malware. In: Proceedings of the Workshop on Recurring Malcode, WORM 2007, pp. 31\u201337 (2007)","DOI":"10.1145\/1314389.1314397"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-aware malware detection. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 32\u201346 (2005)","DOI":"10.1109\/SP.2005.20"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X.: Synthesizing near-optimal malware specifications from suspicious behaviors. In: IEEE Symposium on Security and Privacy, pp. 45\u201360 (2010)","DOI":"10.1109\/SP.2010.11"},{"key":"1_CR7","unstructured":"Golub, G.H., Loan, C.F.V.: Matrix Computations, 3rd edn. The Johns Hopkins University Press (1996)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Hu, X., Chiueh, T., Shin, K.G.: Large-scale malware indexing using function-call graphs. In: ACM Conference on Computer and Communications Security, pp. 611\u2013620 (2009)","DOI":"10.1145\/1653662.1653736"},{"key":"1_CR9","unstructured":"Idika, N., Mathur, A.: A survey of malware detection techniques. Tech. rep., Purdue Univ. (February 2007), http:\/\/www.eecs.umich.edu\/techreports\/cse\/2007\/CSE-TR-530-07.pdf"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Kinable, J., Kostakis, O.: Malware classification based on call graph clustering. Journal in Computer Virology, 33\u201345 (2011)","DOI":"10.1007\/s11416-011-0151-y"},{"key":"1_CR11","unstructured":"Kirda, E., Kruegel, C.: Behavior based spyware detection. In: Proceedings of the 15th USENIX Security Symposium, pp. 273\u2013288 (2006)"},{"key":"1_CR12","unstructured":"Kolter, J., Maloof, M.: Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 2721\u20132744 (2006)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Raghavan, P., Schutze, H.: An Introduction to Information Retrieval. Cambridge University Press (2009)","DOI":"10.1017\/CBO9780511809071"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Mehdi, S., Tanwani, A.K., Farooq, M.: Imad: in-execution malware analysis and detection. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, pp. 1553\u20131560 (2009)","DOI":"10.1145\/1569901.1570109"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Exploring multiple execution paths for malware analysis. In: Proceedings of the IEEE Symposium on Security and Privacy, SP 2007, pp. 231\u2013245 (2007)","DOI":"10.1109\/SP.2007.17"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for malware detection. In: Proceedings of the 23rd Annual Computer Security Applications Conference, ACSAC 2007, pp. 421\u2013430 (2007)","DOI":"10.1109\/ACSAC.2007.21"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Perdisci, R., Lanzi, A., Lee, W.: Mcboost: Boosting scalability in malware collection and analysis using statistical classification of executables. In: Proceedings of the 2008 Annual Computer Security Applications Conference, ACSAC, pp. 301\u2013310 (2008)","DOI":"10.1109\/ACSAC.2008.22"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/11961635_19","volume-title":"Information Systems Security","author":"D. Krishna Sandeep Reddy","year":"2006","unstructured":"Krishna Sandeep Reddy, D., Dash, S.K., Pujari, A.K.: New Malicious Code Detection Using Variable Length n-grams. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol.\u00a04332, pp. 276\u2013288. Springer, Heidelberg (2006)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Reddy, D., Pujari, A.: N-gram analysis for computer virus detection. Journal in Computer Virology, 231\u2013239 (2006)","DOI":"10.1007\/s11416-006-0027-8"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Schultz, M., Eskin, E., Zadok, E., Stolfo, S.: Data mining methods of detection of new malicious executables. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 38\u201349 (2001)","DOI":"10.1109\/SECPRI.2001.924286"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Sung, A., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables (save). In: Proceedings of the 20th Annual Compter Security Applications Conference, ACSAC 2004, pp. 326\u2013334 (2004)","DOI":"10.1109\/CSAC.2004.37"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Ye, Y., Li, T., Zhu, S., Zhuang, W., Tas, E., Gupta, U., Abdulhayoglu, M.: Combining file content and file relations for cloud based malware detection. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 222\u2013230. ACM (2011)","DOI":"10.1145\/2020408.2020448"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37300-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T00:25:14Z","timestamp":1745972714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37300-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372995","9783642373008"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37300-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}