{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:01:10Z","timestamp":1773655270531,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080212","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"1045-1055","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls"],"prefix":"10.3103","volume":"53","author":[{"given":"R. A.","family":"Ognev","sequence":"first","affiliation":[]},{"given":"E. V.","family":"Zhukovskii","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7217_CR1","unstructured":"Hu, X., et al., Mutant x-s: Scalable malware clustering based on static features, 2013 USENIX Annual Technical Conference, 2013, pp. 187\u2013198."},{"key":"7217_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11416-014-0227-6","volume":"12","author":"C. Opri\u015fa","year":"2016","unstructured":"Opri\u015fa, C., Cab\u0103u, G., and Pal, G.S., Malware clustering using suffix trees, J. Comput. Virol. Hacking Tech., 2016, vol. 12, no. 1, pp. 1\u201310.","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"7217_CR3","first-page":"2031","volume":"7","author":"A. Altaher","year":"2012","unstructured":"Altaher, A., et al., Malware detection based on evolving clustering method for classification, Sci. Res. Essays, 2012, vol. 7, no. 22, pp. 2031\u20132036.","journal-title":"Sci. Res. Essays"},{"key":"7217_CR4","first-page":"353","volume":"15","author":"N.V. Shishkin","year":"2012","unstructured":"Shishkin, N.V., Matskevich, E.E., and Kozachok, A.V., A malware detection algorithm based on analysis of malware behavior, Inf. Bezop., 2012, vol. 15, no. 3, pp. 353\u2013360.","journal-title":"Inf. Bezop."},{"key":"7217_CR5","volume-title":"A comparison of clustering techniques for malware analysis, Master\u2019s Project","author":"S. Pai","year":"2015","unstructured":"Pai, S., A comparison of clustering techniques for malware analysis, Master\u2019s Project, San Jose State University, 2015."},{"key":"7217_CR6","first-page":"8","volume":"9","author":"G. Wicherski","year":"2009","unstructured":"Wicherski, G., peHash: A novel approach to fast malware clustering, LEET, 2009, vol. 9, p. 8.","journal-title":"LEET"},{"key":"7217_CR7","doi-asserted-by":"crossref","unstructured":"Giannella, C. and Bloedorn, E., Spectral malware behavior clustering, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI), 2015, pp. 7\u201312.","DOI":"10.1109\/ISI.2015.7165931"},{"key":"7217_CR8","unstructured":"Cuckoo Sandbox. https:\/\/cuckoosandbox.org\/."},{"key":"7217_CR9","unstructured":"VirusShare. https:\/\/virusshare.com\/."},{"key":"7217_CR10","series-title":"Learning feature representations with k-means","volume-title":"Neural Networks: Tricks of the Trade","author":"A. Coates","year":"2012","unstructured":"Coates, A. and Ng, A.Y., Learning feature representations with k-means, in Neural Networks: Tricks of the Trade, Berlin\u2013Heidelberg: Springer, 2012, pp. 561\u2013580."},{"key":"7217_CR11","unstructured":"Xiaojin Zhu, The EM Algorithm, University of Wisconsin, 2007. http:\/\/pages.cs.wisc.edu\/~jerryzhu\/ cs761\/em.pdf."},{"key":"7217_CR12","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1126\/science.1136800","volume":"315","author":"B.J. Frey","year":"2007","unstructured":"Frey, B.J. and Dueck, D., Clustering by passing messages between data points, Science, 2007, vol. 315, no. 5814, pp. 972\u2013976.","journal-title":"Science"},{"key":"7217_CR13","unstructured":"Chen, G., et al., Evaluation and comparison of clustering algorithms in analyzing ES cell gene expression data, Stat. Sin., 2002, pp. 241\u2013262."},{"issue":"2","key":"7217_CR14","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TPAMI.1979.4766909","volume":"PAMI-1","author":"David L. Davies","year":"1979","unstructured":"Davies, D.L. and Bouldin, D.W., A cluster separation measure, IEEE Trans. Pattern Anal. Mach. Intell., 1979, no. 2, pp. 224\u2013227.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"7217_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03610927408827101","volume":"3","author":"T. Cali\u0144ski","year":"1974","unstructured":"Cali\u0144ski, T. and Harabasz, J., A dendrite method for cluster analysis, Commun. Stat. Theory Methods, 1974, vol.\u00a03, no. 1, pp. 1\u201327.","journal-title":"Commun. Stat. Theory Methods"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080212.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080212","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080212.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:57:35Z","timestamp":1773611855000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080212"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7217"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080212","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"18 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}