{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:10Z","timestamp":1759091530996,"version":"3.37.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2111"],"award-info":[{"award-number":["N00014-18-1-2111"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE 1745016"],"award-info":[{"award-number":["DGE 1745016"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s10588-019-09300-w","type":"journal-article","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T06:02:52Z","timestamp":1577944972000},"page":"307-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting malware communities using socio-cultural cognitive mapping"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4205-5806","authenticated-orcid":false,"given":"Iain","family":"Cruickshank","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anthony","family":"Johnson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Timothy","family":"Davison","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthew","family":"Elder","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kathleen M.","family":"Carley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,1,2]]},"reference":[{"key":"9300_CR1","doi-asserted-by":"publisher","first-page":"10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel VD, Guillaume J-L, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech 2008:10008","journal-title":"J Stat Mech"},{"key":"9300_CR2","unstructured":"Dell SecureWorks Counter Threat Unit, \u201cSakula Malware Family,\u201d SecureWorks (2015) https:\/\/www.secureworks.com\/research\/sakula-malware-family. Accessed Apr 2019"},{"key":"9300_CR3","first-page":"91","volume":"3","author":"J Kornblum","year":"2006","unstructured":"Kornblum J (2006) Identifying almost identical files using context triggered piecewise hashing. The Digital Forensic Research Conference 3:91\u201397","journal-title":"The Digital Forensic Research Conference"},{"key":"9300_CR4","doi-asserted-by":"crossref","unstructured":"Lindner G, Staudt CL, Hamann M, Meyerhenke H, Wagner D (2015) Structure-preserving sparsification of social networks. CoRR, vol abs\/1505.00564","DOI":"10.1145\/2808797.2809313"},{"key":"9300_CR5","volume-title":"Social network analysis with applications","author":"I McCulloh","year":"2013","unstructured":"McCulloh I, Johnson A (2013) Social network analysis with applications. Wiley, Hoboken"},{"key":"9300_CR6","doi-asserted-by":"crossref","unstructured":"Morgan GP, Levine J, Carley KM (2017) Socio-cultural cognitive mapping. In: Social, cultural, and behavioral modeling. Springer, Berlin, pp 71\u201376","DOI":"10.1007\/978-3-319-60240-0_9"},{"key":"9300_CR7","doi-asserted-by":"crossref","unstructured":"Premachandran V, Kakarala R (2013) Consensus of k-NNs for robust neighborhood selection on graph-based manifolds. In: 2013 IEEE conference on computer vision and pattern recognition","DOI":"10.1109\/CVPR.2013.209"},{"key":"9300_CR8","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.neucom.2018.05.084","volume":"312","author":"L Qiao","year":"2018","unstructured":"Qiao L, Zhang L, Chen S, Shen D (2018) Data-driven graph construction and graph learning: a review. Neurocomputing 312:336\u2013351","journal-title":"Neurocomputing"},{"key":"9300_CR9","doi-asserted-by":"crossref","unstructured":"Satuluri V, Parthasarathy S, Ruan Y (2011) Local graph sparsification for scalable clustering. In: Proceedings of the 2011 ACM SIGMOD international conference on management of data, New York, NY, USA","DOI":"10.1145\/1989323.1989399"},{"key":"9300_CR10","doi-asserted-by":"crossref","unstructured":"Saxe J, Berlin K (2015) Deep neural network based malware detection using two dimensional binary program features. In: 10th international conference on malicious and unwanted software (MALWARE)","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"9300_CR11","unstructured":"VirusTotal (2019) https:\/\/www.virustotal.com. Accessed July 2019"},{"key":"9300_CR12","doi-asserted-by":"crossref","unstructured":"Ye Y, Li T, Adjeroh D, Iyengar SS (2017) A survey on malware detection using data mining techniques. ACM Comput Surv 50(3):41:1\u201341:40","DOI":"10.1145\/3073559"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-019-09300-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-019-09300-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-019-09300-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:34:59Z","timestamp":1609461299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-019-09300-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9300"],"URL":"https:\/\/doi.org\/10.1007\/s10588-019-09300-w","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"type":"print","value":"1381-298X"},{"type":"electronic","value":"1572-9346"}],"subject":[],"published":{"date-parts":[[2020,1,2]]},"assertion":[{"value":"2 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}