{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:34Z","timestamp":1773615874745,"version":"3.50.1"},"reference-count":17,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080162","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1121-1128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Encrypted File Detection Algorithm"],"prefix":"10.3103","volume":"55","author":[{"given":"A. V.","family":"Kozachok","sequence":"first","affiliation":[]},{"given":"V. I.","family":"Kozachok","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Spirin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7444_CR1","unstructured":"Leakages of restricted data access for 9 months of 2020. www.infowatch.ru\/analytics\/reports\/utechki-informatsii-ogranichennogo-dostupa-otchet-za-9-mesyatsev-2020. Cited June 16, 2021."},{"key":"7444_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TNSM.2020.2967721","volume":"17","author":"D.C. Le","year":"2020","unstructured":"Le, D.C., Zincir-Heywood, N., and Heywood, M.I., Analyzing data granularity levels for insider threat detection using machine learning, IEEE Trans. Network Service Manage., 2020, vol. 17, no. 1, pp. 30\u201344. \u00a0https:\/\/doi.org\/10.1109\/TNSM.2020.2967721","journal-title":"IEEE Trans. Network Service Manage."},{"key":"7444_CR3","doi-asserted-by":"publisher","first-page":"5823439","DOI":"10.1155\/2018\/5823439","volume":"2018","author":"X. Yu","year":"2018","unstructured":"Yu, X., Tian, Z., Qiu, J., and Jiang, F., A data leakage prevention method based on the reduction of confidential and context terms for smart mobile devices, Wireless Commun. Mobile Comput., 2018, vol. 2018, p. 5823439. https:\/\/doi.org\/10.1155\/2018\/5823439","journal-title":"Wireless Commun. Mobile Comput."},{"key":"7444_CR4","doi-asserted-by":"publisher","first-page":"15","DOI":"10.17562\/PB-56-2","volume":"56","author":"K. Karampidis","year":"2017","unstructured":"Karampidis, K., Kavallieratou, E., and Papadourakis, G., Comparison of classification algorithms for file type detection: A digital forensics perspective, Polybits, 2017, vol. 56, pp.\u00a015\u201320. https:\/\/doi.org\/10.17562\/PB-56-2","journal-title":"Polybits"},{"key":"7444_CR5","doi-asserted-by":"publisher","first-page":"e1211","DOI":"10.1002\/widm.1211","volume":"7","author":"L. Cheng","year":"2017","unstructured":"Cheng, L., Liu, F., and Yao, D., Enterprise data breach: causes, challenges, prevention, and future directions, WIREs \n               Data Mining Knowl. Discov., 2017, vol. 7, p. e1211. \u00a0https:\/\/doi.org\/10.1002\/widm.1211","journal-title":"Data Mining Knowl. Discov."},{"key":"7444_CR6","doi-asserted-by":"publisher","unstructured":"Doroud, H., Aceto, G., de Donato, W., Jarchlo, E.A., Lopez, A.M., Guerrero, C.D., and Pescape, A., Speeding-up DPI traffic classification with chaining, IEEE Global Communications Conf. (GLOBECOM), Abu Dhabi, United Arab Emirates, 2018, IEEE, 2018, pp. 1\u20136. \u00a0https:\/\/doi.org\/10.1109\/GLOCOM.2018.8648137","DOI":"10.1109\/GLOCOM.2018.8648137"},{"key":"7444_CR7","unstructured":"Hahn D., Apthorpe N., and Feamster N., Detecting compressed cleartext traffic from consumer internet of things devices, 2018. arXiv:1805.02722 [cs.CR]"},{"key":"7444_CR8","doi-asserted-by":"publisher","unstructured":"Wood, D., Apthorpe, N., and Feamster, N., Cleartext data transmissions in consumer IoT medical devices, Proc. 2017 Workshop on Internet of Things Security and Privacy, Dallas, Tex., 2017, New York: Association for Computing Machinery, 2017, pp. 7\u201312. \u00a0https:\/\/doi.org\/10.1145\/3139937.3139939","DOI":"10.1145\/3139937.3139939"},{"key":"7444_CR9","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TIFS.2018.2823697","volume":"13","author":"F. Wang","year":"2018","unstructured":"Wang, F., Quach, T.-T., Wheeler, J., Aimone, J.B., and James, C.D., Sparse coding for n-gram feature extraction and training for file fragment classification, IEEE Trans. Inf. Forensics Secur., 2018, vol. 13, no. 10, pp.\u00a02553\u20132562. \u00a0https:\/\/doi.org\/10.1109\/TIFS.2018.2823697","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7444_CR10","doi-asserted-by":"publisher","first-page":"6","DOI":"10.15394\/jdfsl.2017.1472","volume":"12","author":"K. Karampidis","year":"2017","unstructured":"Karampidis, K. and Papadourakis, G., File type identification-computational intelligence for digital forensics, J. Digital Forensics, \n               Secur. Law, 2017, vol. 12, no. 2, p. 6. \u00a0https:\/\/doi.org\/10.15394\/jdfsl.2017.1472","journal-title":"Secur. Law"},{"key":"7444_CR11","series-title":"Forged file detection and stagnographic content identification (FFDASCI) using deep learning techniques","volume-title":"CEUR Workshop Proc., Moscow","author":"M. Srinivas","year":"2019","unstructured":"Srinivas, M., Nayak, A., and Bhatt, A., Forged file detection and stagnographic content identification (FFDASCI) using deep learning techniques, CEUR Workshop Proc., Moscow, 2019, Basarab, M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019. http:\/\/ceur-ws.org\/Vol-2380\/paper_142.pdf"},{"key":"7444_CR12","doi-asserted-by":"publisher","unstructured":"Konaray, S.K., Toprak, A., Pek, G.M., Ak\u00e7ekoce, H., and K\u0131l\u0131n\u00e7, D., Detecting file types using machine learning algorithms, Innovations in Intelligent Systems and Applications Conf., Izmir, Turkey, 2019, IEEE, 2019, pp. 1\u20134. \u00a0https:\/\/doi.org\/10.1109\/ASYU48272.2019.8946393","DOI":"10.1109\/ASYU48272.2019.8946393"},{"key":"7444_CR13","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TIFS.2019.2911156","volume":"14","author":"F. Casino","year":"2019","unstructured":"Casino, F., Choo, K.-K.R., and Patsakis, C., HEDGE: Efficient traffic classification of encrypted and compressed packets, IEEE Trans. Inf. Forensics Secur., 2019, vol. 14, no. 11, pp.\u00a02916\u20132926.\u00a0https:\/\/doi.org\/10.1109\/TIFS.2019.2911156","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7444_CR14","series-title":"EnCoD: Distinguishing compressed and encrypted file fragments","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65745-1_3","volume-title":"Network and System Security. NSS 2020","author":"F. De Gaspari","year":"2020","unstructured":"De Gaspari, F., Hitaj, D., Pagnotta, G., De Carli, L., and Mancini, L.V., EnCoD: Distinguishing compressed and encrypted file fragments,  Network and System Security. NSS 2020, Kuty\u0142owski, M., Zhang, J., and Chen, C., Eds., Lecture Notes in Computer Science, vol.\u00a012570, Cham: Springer, 2020, pp. 42\u201362. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-65745-1_3"},{"key":"7444_CR15","doi-asserted-by":"publisher","unstructured":"Mousavi, S.S., Detecting disk sectors data types using hidden Markov model, 17th Int. ISC Conf. on Information Security and Cryptology (ISCISC), Tehran, 2020, IEEE, 2020, pp.\u00a060\u201364. \u00a0https:\/\/doi.org\/10.1109\/ISCISC51277.2020.9261906","DOI":"10.1109\/ISCISC51277.2020.9261906"},{"key":"7444_CR16","first-page":"30","volume":"21","author":"V.S. Matveeva","year":"2014","unstructured":"Matveeva, V.S., Information entropy and its application for information security tasks, Bezop. Inf. Tekhnol., 2014, vol. 21, no. 3, pp. 30\u201336.","journal-title":"Bezop. Inf. Tekhnol."},{"key":"7444_CR17","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1134\/S0361768821040058","volume":"47","author":"A.V. Kozachok","year":"2021","unstructured":"Kozachok, A.V. and Spirin, A.A., Model of pseudo-random sequences generated by encryption and compression algorithms, Program. Comput. Software, 2021, vol. 47, no. 4, pp.\u00a0249\u2013260. \u00a0https:\/\/doi.org\/10.1134\/S0361768821040058","journal-title":"Program. Comput. Software"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080162.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080162","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080162.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:04Z","timestamp":1773612364000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":17,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7444"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080162","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"18 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}