{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:19:22Z","timestamp":1740169162413,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["2018R1C1B5084424"],"award-info":[{"award-number":["2018R1C1B5084424"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","award":["2019R1A6A1A03032119"],"award-info":[{"award-number":["2019R1A6A1A03032119"]}],"id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2964260","type":"journal-article","created":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T20:29:41Z","timestamp":1578342581000},"page":"40640-40655","source":"Crossref","is-referenced-by-count":4,"title":["Redundancy Analysis and Elimination on Access Patterns of the Windows Applications Based on I\/O Log Data"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6821-2910","authenticated-orcid":false,"given":"Jun-Ha","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1125-6533","authenticated-orcid":false,"given":"Hyuk-Yoon","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375595"},{"key":"ref33","first-page":"215","article-title":"Control flow driven splitting of loop nests at the source code level","author":"falk","year":"2005","journal-title":"Proc Conf Design Automat Test Eur"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1324969.1324971"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSS.2000.874049"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409198"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CANDAR.2017.75"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3077627"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2349501"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086718"},{"journal-title":"Registry Functions","year":"2019","key":"ref10"},{"journal-title":"IDA About","year":"2019","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250706"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2138"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36084-0_3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAEECE.2013.6557209"},{"key":"ref16","first-page":"4427","article-title":"Windows registry forensics: An imperative step in tracking data theft via USB devices","volume":"3","author":"roy","year":"2012","journal-title":"Int J Comput Sci Inf Technol"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47764-0_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1999.792593"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.06.013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/314403.314414"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.4364"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1145\/500001.500036","article-title":"source code transformation based on software cost analysis","author":"chung","year":"2001","journal-title":"International Symposium on System Synthesis (IEEE Cat No 01EX526) ISSS-01"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5120\/21129-3904"},{"journal-title":"RegistryProt","year":"2019","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2723772.2723777"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.003"},{"journal-title":"How to Open Registry Editor in Windows 10","year":"2019","key":"ref8"},{"key":"ref7","first-page":"393","article-title":"Windows registry and hiding suspects&#x2019; secret in registry","author":"kim","year":"2017","journal-title":"Proc Int Conf Inf Secur Assurance"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-015-0049-7"},{"journal-title":"Process Monitor v3 50","year":"2019","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/eb047884"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178257"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CAIA.1995.378786"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2012.69"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69389-5_29"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1117\/12.583554"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.1995.389152"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08950307.pdf?arnumber=8950307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:50:42Z","timestamp":1639770642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8950307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2964260","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}