{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:48:54Z","timestamp":1764305334396},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/euvip.2014.7018361","type":"proceedings-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T10:22:47Z","timestamp":1422354167000},"page":"1-5","source":"Crossref","is-referenced-by-count":6,"title":["Detecting packed executables using steganalysis"],"prefix":"10.1109","author":[{"given":"Colin","family":"Burgess","sequence":"first","affiliation":[]},{"given":"Fatih","family":"Kurugollu","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]},{"given":"Keiran","family":"McLaughlin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00153759"},{"key":"17","first-page":"4","article-title":"Malware images: Visualization and automatic classification","author":"lakshmanan","year":"2011","journal-title":"Proceedings of the 8th International Symposium on Visualization for Cyber Security"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011139631724"},{"key":"16","article-title":"Malware analysis using visualized images and histograms","author":"han","year":"2013","journal-title":"Under Review-Springer Journal of Information Security"},{"key":"13","first-page":"33","article-title":"Visual analysis of malware behaviour using treemaps and thread graphs","author":"holz","year":"2009","journal-title":"6th International Workshop on Visualization for Cyber Security 2009 VizSec 2009"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016908"},{"key":"11","first-page":"99","article-title":"The study of evasion of packed pe from static detection","author":"baig","year":"2012","journal-title":"World Congress on Internet Security (WorldCIS)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2041826"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3745\/KIPSTC.2009.16C.5.555"},{"key":"20","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-04342-0_7","article-title":"PE-miner: Mining structural information to detect malicious executables in realtime","author":"shafiq","year":"2009","journal-title":"Recent Advances in Intrusion Detection"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.48"},{"key":"1","article-title":"Useful and useless statistics about viruses and anti-virus programs, 2010","author":"pilz","year":"2010","journal-title":"Proceedings from the CARO Workshop"},{"key":"10","first-page":"164","article-title":"Countering entropy measure attacks on packed software detection","author":"xabier","year":"2012","journal-title":"Consumer Communications and Networking Conference (CCNC) 2012 IEEE"},{"key":"7","article-title":"PE-probe: Leveraging packer detection and structural information to detect malicious portable executables","author":"tabish","year":"2009","journal-title":"Proceedings of the Virus Bulletin Conference (VB)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137328"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.06.016"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CSA.2008.28"},{"key":"9","first-page":"23","article-title":"Collective classification for packed executable identification","author":"xabier","year":"2011","journal-title":"CEAS '11 Proceedings of the 8th Annual Collaboration Electronic Messaging Anti-Abuse and Spam Conference"},{"key":"8","first-page":"717","article-title":"Detection of packed executables using support vector machines","author":"wu","year":"2011","journal-title":"Machine Learning and Cybernetics (ICMLC) 2011 International Conference on"}],"event":{"name":"2014 5th European Workshop on Visual Information Processing (EUVIP)","start":{"date-parts":[[2014,12,10]]},"location":"Villetaneuse, Paris, France","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 5th European Workshop on Visual Information Processing (EUVIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7007964\/7018357\/07018361.pdf?arnumber=7018361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T01:10:16Z","timestamp":1566263416000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7018361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/euvip.2014.7018361","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}