{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:00:47Z","timestamp":1774522847870,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,6,8]],"date-time":"2011-06-08T00:00:00Z","timestamp":1307491200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11416-011-0153-9","type":"journal-article","created":{"date-parts":[[2011,6,7]],"date-time":"2011-06-07T10:45:49Z","timestamp":1307443549000},"page":"259-265","source":"Crossref","is-referenced-by-count":56,"title":["Comparing files using structural entropy"],"prefix":"10.1007","volume":"7","author":[{"given":"Ivan","family":"Sorokin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,8]]},"reference":[{"key":"153_CR1","unstructured":"Breitenbacher, Z.: Entropy based detection of polymorphic malware. In: Proceedings of the 19th Annual EICAR Conference \u201cICT Security: Quo Vadis?\u201d, pp. 117\u2013128. Presses Techniques de l\u2019ESIEA, Paris (2010)"},{"key":"153_CR2","unstructured":"Daubechies, I.: Desjat\u2019 lektsij po vejvletam. [Ten lectures on wavelets]. Izhevsk: NIC Regular and Chaotic Dynamics (2001)"},{"key":"153_CR3","unstructured":"Ebringer, R., Sun, L., Boztas, S.: A fast randomness test that preserves local detail. In: Proceedings of the Virus Bulletin (VB) Conference, pp. 34\u201342. Virus Bulletin, Abingdon (2008)"},{"key":"153_CR4","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/978-3-540-69384-0_55","volume-title":"Computational Science\u2014ICCS 2008, vol. 5101","author":"K. Fabjanski","year":"2008","unstructured":"Fabjanski K., Kruk T.: Network traffic classification by common subsequence finding. In: Bubak, M., Albada, G., Sloot, P. (eds) Computational Science\u2014ICCS 2008, vol. 5101, pp. 499\u2013508. Springer, Berlin (2008)"},{"key":"153_CR5","unstructured":"Gheorghescu, M.: An automated virus classification system. In: Proceedings of the Virus Bulletin (VB) Conference, pp. 294\u2013300. Virus Bulletin, Abingdon (2005)"},{"key":"153_CR6","doi-asserted-by":"crossref","unstructured":"Kreibich, C., Crowcroft, J.: Efficient sequence alignment of network traffic. In: Proceedings of Internet Measurement Conference, pp. 307\u2013312. IMC, Melbourne (2006)","DOI":"10.1145\/1177080.1177121"},{"key":"153_CR7","doi-asserted-by":"crossref","unstructured":"Li, J., Xu, J., Xu, M., Zhao, H., Zheng, N.: Malware obfuscation measuring via evolutionary similarity. In: Proceedings of the International Conference on Future Information Networks, pp. 197\u2013200. IEEE Computer Society, Los Alamitos (2009)","DOI":"10.1109\/ICFIN.2009.5339567"},{"issue":"2","key":"153_CR8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2007.48","volume":"5","author":"R. Lyda","year":"2007","unstructured":"Lyda R., Hamrock J.: Using entropy analysis to find encrypted and packed malware. IEEE Security Priv. 5(2), 40\u201345 (2007)","journal-title":"IEEE Security Priv."},{"key":"153_CR9","doi-asserted-by":"crossref","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 226\u2013241. IEEE Computer Society, Los Alamitos (2005)","DOI":"10.1109\/SP.2005.15"},{"issue":"14","key":"153_CR10","doi-asserted-by":"crossref","first-page":"1941","DOI":"10.1016\/j.patrec.2008.06.016","volume":"29","author":"R. Perdisci","year":"2008","unstructured":"Perdisci R., Lanzi A., Lee W.: Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14), 1941\u20131946 (2008)","journal-title":"Pattern Recognit. Lett."},{"key":"153_CR11","doi-asserted-by":"crossref","unstructured":"Sun, L., Versteeg, S., Boztas, S., Yann, T.: Pattern recognition techniques for the classification of malware packers. In: Proceedings of the 15th Australian Conference on Information Security and Privacy (pp. 370\u2013390). Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14081-5_23"},{"key":"153_CR12","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Xu, J., Chavez, P., Mukkamala, S.: Static analyzer of vicious executables (SAVE). In: Proceedings of the 20th Annual Computer Security Applications Conference, pp. 326\u2013334. IEEE Computer Society, Washington (2004)","DOI":"10.1109\/CSAC.2004.37"},{"issue":"4","key":"153_CR13","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s11416-007-0074-9","volume":"4","author":"G. Wagener","year":"2007","unstructured":"Wagener G., State R., Dulaunoy A.: Malware behaviour analysis, extended version. J. Comput. Virol. 4(4), 279\u2013287 (2007)","journal-title":"J. Comput. Virol."},{"key":"153_CR14","doi-asserted-by":"crossref","unstructured":"Christodorescu, M., Jha, S.: Testing malware detectors. In: Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 34\u201344. ACM, New York (2004)","DOI":"10.1145\/1013886.1007518"},{"key":"153_CR15","unstructured":"Jacob, G., Neugschwandtner, M., Comparetti, P.M., Kruegel, C., Vigna, G.: A static, packer-agnostic filter to detect similar malware samples. Department of Computer Science University of California Santa Barbara Technical Report, 2010\u201326. Retrieved 29 November 2010 from http:\/\/www.cs.ucsb.edu\/research\/tech_reports\/ (2010)"},{"issue":"1","key":"153_CR16","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/321796.321811","volume":"21","author":"R.A. Wagner","year":"1974","unstructured":"Wagner R.A., Fischer M.J.: The string-to-string correction problem. J. ACM 21(1), 168\u2013173 (1974)","journal-title":"J. ACM"},{"key":"153_CR17","unstructured":"Prangi\u0161vili, I.V.: \u00c8ntropijnye i drugie sistemnye zakonomernosti. Voprosy upravlenija slo\u017enymi sistemami (Entropy and other system laws. Issues of managing complex systems). p. 432. Nauka, Moscow (2003)"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-011-0153-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-011-0153-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-011-0153-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T00:43:39Z","timestamp":1741221819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-011-0153-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,8]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["153"],"URL":"https:\/\/doi.org\/10.1007\/s11416-011-0153-9","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,8]]}}}