{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:31Z","timestamp":1773615871882,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080459","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1175-1179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Software Identification by Standard Machine Learning Tools"],"prefix":"10.3103","volume":"55","author":[{"given":"M. E.","family":"Sukhoparov","sequence":"first","affiliation":[]},{"given":"K. I.","family":"Salakhutdinova","sequence":"additional","affiliation":[]},{"given":"I. S.","family":"Lebedev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7452_CR1","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, 2018, New York: Association for Computing Machinery, 2018, p. 7. \u00a0https:\/\/doi.org\/10.1145\/3264437.3264476","DOI":"10.1145\/3264437.3264476"},{"key":"7452_CR2","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411617080144","volume":"51","author":"E.Yu. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829\u2013834. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080144","journal-title":"Autom. Control Comput. Sci."},{"key":"7452_CR3","series-title":"An approach to selecting an informative feature in software identification","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01168-0_30","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018","author":"K. Salakhutdinova","year":"2018","unstructured":"Salakhutdinova, K., Krivtsova, I., Lebedev, I., and Sukhoparov, M., An approach to selecting an informative feature in software identification,  Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018, Galinina, O., Andreeva, S., Balandin, S., and Koucheryavy, Yu., Eds., Lecture Notes in Computer Science, vol. 11118, Cham: Springer, 2018, pp. 318\u2013327. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-01168-0_30"},{"key":"7452_CR4","doi-asserted-by":"publisher","unstructured":"Krivtsova, I.E., Lebedev, I.S., and Salakhutdinova, K.I., Identification of executable files on the basis of statistical criteria, 20th Conf. of Open Innovations Association (FRUCT), St.\u00a0Petersburg, 2017, IEEE, 2017, pp. 202\u2013208. \u00a0https:\/\/doi.org\/10.23919\/FRUCT.2017.8071312","DOI":"10.23919\/FRUCT.2017.8071312"},{"key":"7452_CR5","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.3103\/S0146411618080229","volume":"52","author":"K.I. Salakhutdinova","year":"2018","unstructured":"Salakhutdinova, K.I., Lebedev, I.S., Krivtsova, I.E., and Sukhoparov, M.E., Studying the effect of selection of the sign and ratio in the formation of a signature in a program identification problem, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1101\u20131104. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080229","journal-title":"Autom. Control Comput. Sci."},{"key":"7452_CR6","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.17586\/2226-1494-2018-18-6-1016-1022","volume":"18","author":"K.I. Salakhutdinova","year":"2018","unstructured":"Salakhutdinova, K.I., Lebedev, I.S., and Krivtsova, I.E., Gradient boosting trees method in the task of software identification, Nauch.-Tekh. Vestn. Inf. Tekhnol., \n               Mekh. Opt., 2018, vol.\u00a018, no. 6, pp. 1016\u20131022. \u00a0https:\/\/doi.org\/10.17586\/2226-1494-2018-18-6-1016-1022","journal-title":"Mekh. Opt."},{"key":"7452_CR7","series-title":"Implementing a broadcast storm attack on a mission-critical wireless sensor network","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33936-8_23","volume-title":"Wired\/Wireless Internet Communications. WWIC 2016","author":"I. Krivtsova","year":"2016","unstructured":"Krivtsova, I., Lebedev, I., Sukhoparov, M., Bazhayev, N., Zikratov, I., Ometov, A., Andreev, S., Masek, P., Fujdiak, R., and Hosek, J., Implementing a broadcast storm attack on a mission-critical wireless sensor network, Wired\/Wireless Internet Communications. WWIC 2016, Mamatas, L., Matta, I., Papadimitriou, P., and Koucheryavy, Y., Eds., Lecture Notes in Computer Science, vol. 9674, Cham: Springer, 2016, pp. 297\u2013308. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-33936-8_23"},{"key":"7452_CR8","unstructured":"CatBoost, GitHub. https:\/\/github.com\/catboost. Cited January 29, 2019"},{"key":"7452_CR9","unstructured":"XGBoost, GitHub. https:\/\/github.com\/dmlc\/xgboost. Cited February 9, 2019."},{"key":"7452_CR10","doi-asserted-by":"crossref","unstructured":"Kitov, V.V., Accuracy analysis of the gradient boosting method with random rotations, Ekon. Stat. Inf. Vestn. UMO, 2016, no. 4, pp. 22\u201326.","DOI":"10.21686\/2500-3925-2016-4-22-26"},{"key":"7452_CR11","unstructured":"LightGBM, GitHub. https:\/\/github.com\/Microsoft\/LightGBM. Cited February 2, 2019."},{"key":"7452_CR12","first-page":"26","volume":"15","author":"I.L. Kaftannikov","year":"2015","unstructured":"Kaftannikov, I.L. and Parasich, A.V., Decision tree\u2019s features of application in classification problems, Vestn. Yuzhno-Ural. Gos. Univ. Ser.: Komp\u2019yut. Tekhnol., Upr., \n               Radioelektron., 2015, vol. 15, no. 3, pp. 26\u201332.","journal-title":"Radioelektron."},{"key":"7452_CR13","doi-asserted-by":"crossref","unstructured":"Bagga, A. and Baldwin, B., Cross-document event coreference: Annotations, experiments, and observations, Proc. ACL-99 Workshop on Coreference and Its Applications, College Park, Md., 1999, 1999.","DOI":"10.3115\/1608810.1608812"},{"key":"7452_CR14","unstructured":"Antonov, A.E. and Fedulov, A.S., Identification of file type on the basis of structural analysis, Prikl. Inf., 2013, no. 2, pp. 68\u201377."},{"key":"7452_CR15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.diin.2006.06.015","volume":"3","author":"J.D. Kornblum","year":"2006","unstructured":"Kornblum, J.D., Identifying almost identical files using context triggered piecewise hashing, Digital Invest., 2006, vol. 3, pp. 91\u201397. \u00a0https:\/\/doi.org\/10.1016\/j.diin.2006.06.015","journal-title":"Digital Invest."},{"key":"7452_CR16","unstructured":"Ebringer, T., Sun, L., and Boztas, S., A fast randomness test that preserves local detail, Proc. 18th Virus Bull. Int. Conf., Ottawa, 2008, pp. 34\u201342."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080459.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080459","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080459.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:58Z","timestamp":1773612358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7452"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080459","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"14 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}