{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:00:01Z","timestamp":1771516801519,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,6,15]],"date-time":"2012-06-15T00:00:00Z","timestamp":1339718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s11416-012-0166-z","type":"journal-article","created":{"date-parts":[[2012,6,13]],"date-time":"2012-06-13T21:09:12Z","timestamp":1339621752000},"page":"151-163","source":"Crossref","is-referenced-by-count":29,"title":["A practical approach on clustering malicious PDF documents"],"prefix":"10.1007","volume":"8","author":[{"given":"Cristina","family":"Vatamanu","sequence":"first","affiliation":[]},{"given":"Drago\u015f","family":"Gavrilu\u0163","sequence":"additional","affiliation":[]},{"given":"R\u0103zvan","family":"Benchea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,15]]},"reference":[{"key":"166_CR1","doi-asserted-by":"crossref","unstructured":"Cova, M., Kruegel, C., Vigna, G.: Detection and Analysis of Drive-by Download Attacks and Malicious JavaScript Code. In Proceedings of International World Wide Web Conference (WWW) (2010)","DOI":"10.1145\/1772690.1772720"},{"key":"166_CR2","unstructured":"Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, and Henry M. Levy: SpyProxy: Execution-based Detection of Malicious Web Content. In Proceedings of the USENIX Security Symposium (2007)"},{"key":"166_CR3","doi-asserted-by":"crossref","unstructured":"Canali, D., Cova, M., Vigna, G., Kruegel, C.: Prophiler: a Fast Filter for the Large-Scale Detection of Malicious Web Pages. 20th International World Wide Web Conference (2011)","DOI":"10.1145\/1963405.1963436"},{"key":"166_CR4","unstructured":"Curtsinger, C., Livshits, B., Zorn, B., Seifert, C.: Zozzle: Low-overhead Mostly Static JavaScript Malware Detection. USENIX Security Symposium, August 2011"},{"key":"166_CR5","unstructured":"Karanth, S., Laxman, S., Naldurg, P., Venkatesan, R., Lambert, J., Shin, J.: Pattern Mining for Future Attacks (2010)"},{"key":"166_CR6","doi-asserted-by":"crossref","unstructured":"Mozgovoy, M., Fredriksson, K., White, D., Joy M., Sutinen, E.: Fast Plagiarism Detection System. 12th International Conference (SPIRE 2005)","DOI":"10.1007\/11575832_30"},{"key":"166_CR7","unstructured":"Prechelt, L., Malpohl, G., Phlippsen, M.: JPlag: Finding plagiarisms among a set of programs. Technical report, Fakultat for Informatik, Universitat Karlsruhe (2000)"},{"key":"166_CR8","unstructured":"Feinstein, B., Peck, D.: Automated Collection, Detection and Analysis of Malicious JavaScript. In Proceedings of the Black Hat Security Conference (2007)"},{"key":"166_CR9","unstructured":"Selvaraj, K., Gutierrez, N.F.: The Rise Of PDF Malware. In Symantec Security Response, (2010) ( http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security\/_response\/whitepapers\/the_rise_of_pdf_malware.pdf )"},{"key":"166_CR10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction To Information Retrieval, chapter 16 and 17","author":"C.D. Manning","year":"2008","unstructured":"Manning C.D., Raghavan P., Schtze H.: Introduction To Information Retrieval, chapter 16 and 17. Cambridge University Press, Cambridge (2008)"},{"key":"166_CR11","unstructured":"Crockford, D.:Ecma Reference, Json.org, July 2006. ( http:\/\/www.ietf.org\/rfc\/rfc4627 )"},{"key":"166_CR12","unstructured":"Rivest, R.: MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992. ( http:\/\/www.ietf.org\/rfc\/rfc1321.txt )"},{"key":"166_CR13","unstructured":"Eastlake, D.: Motorola P.Jones Cisco Systems, September 2001. ( http:\/\/tools.ietf.org\/html\/rfc3174 )"},{"key":"166_CR14","unstructured":"Eastlake, D., Hansen, T.: Huawei, AT&T Labs, May 2011. ( http:\/\/tools.ietf.org\/html\/rfc6234 )"},{"key":"166_CR15","unstructured":"Nikolas, A.: Fast and Compact Hash Tables for Integer Keys (2009) ( http:\/\/crpit.com\/confpapers\/CRPITV91Askitis.pdf )"},{"key":"166_CR16","unstructured":"MITRE Corporation. Common Vulnerabilities and Exposures (CVE). http:\/\/cve.mitre.org\/"},{"key":"166_CR17","unstructured":"Stanley, K.L., Mishra, S.K.: De novo SVM classification of precursor microRNAs from genomic pseudo hairpins using global and intrinsic folding measures (2007)"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-012-0166-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-012-0166-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-012-0166-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T19:52:23Z","timestamp":1561837943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-012-0166-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,15]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["166"],"URL":"https:\/\/doi.org\/10.1007\/s11416-012-0166-z","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"value":"1772-9890","type":"print"},{"value":"1772-9904","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,15]]}}}