{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:06:21Z","timestamp":1773655581923,"version":"3.50.1"},"reference-count":13,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080228","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1092-1098","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection of Malicious Executable Files Based on Clustering of Activities"],"prefix":"10.3103","volume":"55","author":[{"given":"R. A.","family":"Ognev","sequence":"first","affiliation":[]},{"given":"E. V.","family":"Zhukovskii","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7439_CR1","unstructured":"The AV-TEST security report 2020. www.av-test.org\/fileadmin\/pdf\/security_report\/AVTEST_Security_Report_2019-2020.pdf. Cited March 14, 2021."},{"key":"7439_CR2","unstructured":"Kubrin, G.S. and Ivanov, D.V., Applying machine learning methods to determine phishing sites, Metody Tekh. Sredstva Obesp. Bezop. Inf., 2020, no. 29, pp. 28\u201330."},{"key":"7439_CR3","doi-asserted-by":"publisher","unstructured":"Nair, V.P., Jain, H., Golecha, Y.K., Gaur, M.S., and Laxmi, V., MEDUSA: MEtamorphic malware dynamic analysis using signature from API, Proc. 3rd Int. Conf. on Security of Information and Networks, Rostov-on-Don, Russia, 2010, New York: Association for Computing Machinery, 2010, pp. 263\u2013269. \u00a0https:\/\/doi.org\/10.1145\/1854099.1854152","DOI":"10.1145\/1854099.1854152"},{"key":"7439_CR4","doi-asserted-by":"publisher","unstructured":"Tian, R., Islam, R., Batten, L., and Versteeg, S., Differentiating malware from cleanware using behavioural analysis, 5th Int. Conf. on Malicious and Unwanted Software, Nancy, 2010, IEEE, 2010, pp. 23\u201330. \u00a0https:\/\/doi.org\/10.1109\/MALWARE.2010.5665796","DOI":"10.1109\/MALWARE.2010.5665796"},{"key":"7439_CR5","doi-asserted-by":"publisher","unstructured":"Salehi, Z., Ghiasi, M., and Sami, A., A miner for malware detection based on API function calls and their arguments, The 16th CSI Int. Symp. on Artificial Intelligence and Signal Processing (AISP 2012), Shiraz, Iran, 2012, IEEE, 2012, pp. 563\u2013568. \u00a0https:\/\/doi.org\/10.1109\/AISP.2012.6313810","DOI":"10.1109\/AISP.2012.6313810"},{"key":"7439_CR6","unstructured":"Hansen, S.S. and Larsen, T.M.T., Dynamic malware analysis: Detection and family classification using machine learning, Master\u2019s Thesis, Aalborg: Aalborg Univ., 2015."},{"key":"7439_CR7","doi-asserted-by":"publisher","unstructured":"Dinh, P.V., Shone, N., Dung, P.H., Shi, Q., Hung, N.V., and Ngoc, T.N., Behaviour-aware malware classification: Dynamic feature selection, 11th Int. Conf. on Knowledge and Systems Engineering (KSE), Da Nang, Vietnam, 2019, IEEE, 2019, pp. 1\u20135. \u00a0https:\/\/doi.org\/10.1109\/KSE.2019.8919491","DOI":"10.1109\/KSE.2019.8919491"},{"key":"7439_CR8","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.3103\/S0146411619080212","volume":"53","author":"R.A. Ognev","year":"2019","unstructured":"Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering malicious executable files based on the sequences analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1045\u20131055. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080212","journal-title":"Autom. Control Comput. Sci."},{"key":"7439_CR9","unstructured":"Hooked APIs and categories. https:\/\/github.com\/cuckoosandbox\/cuckoo\/wiki\/Hooked-APIs-and-Categories. Cited March 14, 2021."},{"key":"7439_CR10","doi-asserted-by":"publisher","first-page":"834","DOI":"10.3103\/S0146411620080246","volume":"54","author":"T.D. Ovasapyan","year":"2020","unstructured":"Ovasapyan, T.D., Knyazev, P.V., and Moskvin, D.A., Application of taint analysis to study the safety of software of the Internet of Things devices based on the ARM architecture, Autom. Control Comput. Sci., 2020, vol. 54, no.\u00a08, pp. 834\u2013840. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080246","journal-title":"Autom. Control Comput. Sci."},{"key":"7439_CR11","doi-asserted-by":"publisher","unstructured":"Ovasapyan, T.D., Danilov, V.D., and Moskvin, D.A., Application of synthetic data generation methods in tasks of detecting network attacks on the Internet of Things, devices, Autom. Control Comput. Sci., 2021, vol. 55, no.\u00a08, pp. 991\u2013998.https:\/\/doi.org\/10.3103\/S0146411621080241","DOI":"10.3103\/S0146411621080241"},{"key":"7439_CR12","doi-asserted-by":"publisher","unstructured":"Kalinin, M. and Zegzhda, P., AI-based security for the smart networks, 13th Int. Conf. on Security of Information and Networks, Merkez, Turkey, 2020, New York: Association for Computing Machinery, 2020, pp. 1\u20134. \u00a0https:\/\/doi.org\/10.1145\/3433174.3433593","DOI":"10.1145\/3433174.3433593"},{"key":"7439_CR13","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zegzhda, D., AI methods for neutralizing cyber threats at unmanned vehicular ecosystem of smart city, The Economics of Digital Transformation, Devezas, T., Leit\u00e3o, J., and Sarygulov, A., Eds., Studies on Entrepreneurship, Structural Change and Industrial Dynamics, Cham: Springer, 2021, pp. 151\u2013171. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-59959-1_10","DOI":"10.1007\/978-3-030-59959-1_10"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080228.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080228","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080228.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:27Z","timestamp":1773612207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":13,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7439"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080228","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"20 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}