{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:51:55Z","timestamp":1760241115760,"version":"build-2065373602"},"reference-count":94,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T00:00:00Z","timestamp":1575504000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["PD\/BD\/128149\/2016"],"award-info":[{"award-number":["PD\/BD\/128149\/2016"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Security and privacy concerns are challenging the way users interact with devices. The number of devices connected to a home or enterprise network increases every day. Nowadays, the security of information systems is relevant as user information is constantly being shared and moving in the cloud; however, there are still many problems such as, unsecured web interfaces, weak authentication, insecure networks, lack of encryption, among others, that make services insecure. The software implementations that are currently deployed in companies should have updates and control, as cybersecurity threats increasingly appearing over time. There is already some research towards solutions and methods to predict new attacks or classify variants of previous known attacks, such as (algorithmic) information theory. This survey combines all relevant applications of this topic (also known as Kolmogorov Complexity) in the security and privacy domains. The use of Kolmogorov-based approaches is resource-focused without the need for specific knowledge of the topic under analysis. We have defined a taxonomy with already existing work to classify their different application areas and open up new research questions.<\/jats:p>","DOI":"10.3390\/e21121196","type":"journal-article","created":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T11:16:31Z","timestamp":1575544591000},"page":"1196","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Survey on Using Kolmogorov Complexity in Cybersecurity"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0125-4240","authenticated-orcid":false,"given":"Jo\u00e3o","family":"S. Resende","sequence":"first","affiliation":[{"name":"Computer Science Department, Faculty of Science, University of Porto, Rua do Campo Alegre 1021\/1055, 4169-007 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1838-1417","authenticated-orcid":false,"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[{"name":"Computer Science Department, Faculty of Science, University of Porto, Rua do Campo Alegre 1021\/1055, 4169-007 Porto, Portugal"}]},{"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[{"name":"Computer Science Department, Faculty of Science, University of Porto, Rua do Campo Alegre 1021\/1055, 4169-007 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,5]]},"reference":[{"key":"ref_1","unstructured":"Hoepman, J.H., and Jacobs, B. (2019). Increased security through open source. arXiv."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","article-title":"A survey of emerging threats in cybersecurity","volume":"80","author":"Nepal","year":"2014","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine learning and deep learning methods for cybersecurity","volume":"6","author":"Xin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_4","first-page":"369","article-title":"On tables of random numbers","volume":"25","author":"Kolmogorov","year":"2019","journal-title":"Sankhy\u0101 Indian J. Stat. Ser."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1523","DOI":"10.1109\/TIT.2005.844059","article-title":"Clustering by compression","volume":"51","author":"Cilibrasi","year":"2019","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1162\/0148926042728449","article-title":"Algorithmic clustering of music based on string compression","volume":"28","author":"Cilibrasi","year":"2019","journal-title":"Comput. Music J."},{"key":"ref_7","unstructured":"Santos, C.C., Bernardes, J., Vit\u00e1nyi, P.M., and Antunes, L. (2006, January 22\u201323). Clustering fetal heart rate tracings by compression. Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems (CBMS\u201906), Salt Lake, UT, USA."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3250","DOI":"10.1109\/TIT.2004.838101","article-title":"The similarity metric","volume":"50","author":"Li","year":"2019","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s11416-015-0260-0","article-title":"On normalized compression distance and large malware","volume":"12","author":"Borbely","year":"2016","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s10618-006-0049-3","article-title":"Compression-based data mining of sequential data","volume":"14","author":"Keogh","year":"2019","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_11","first-page":"22","article-title":"Towards automated data linkage and deduplication","volume":"16","author":"Christen","year":"2019","journal-title":"Computer"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Raff, E., and Nicholas, C. (2017, January 13\u201317). An alternative to ncd for large sequences, lempel-ziv jaccard distance. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada.","DOI":"10.1145\/3097983.3098111"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Pinho, A., Pratas, D., and Ferreira, P. (April, January 30). Authorship attribution using compression distances. Proceedings of the 2016 Data Compression Conference, Snowbird, UT, USA.","DOI":"10.1109\/DCC.2016.53"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Prilepok, M., Jezowicz, T., Platos, J., and Snasel, V. (2012, January 21\u201323). Spam detection using compression and PSO. Proceedings of the 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), Sao Carlos, Brazil.","DOI":"10.1109\/CASoN.2012.6412413"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1080\/01969722.2013.805110","article-title":"Spam detection using data compression and signatures","volume":"44","author":"Prilepok","year":"2013","journal-title":"Cybern. Syst."},{"key":"ref_16","unstructured":"Delany, S.J., and Bridge, D. (2019, January 13). Catching the drift: Using feature-free case-based reasoning for spam filtering. Proceedings of the International Conference on Case-Based Reasoning, Berlin\/Heidelberg, Germany."},{"key":"ref_17","first-page":"5","article-title":"Detecting visually similar web pages: Application to phishing detection","volume":"10","author":"Chen","year":"2010","journal-title":"Acm Trans. Internet Technol. Toit"},{"key":"ref_18","first-page":"16","article-title":"An anti-phishing system employing diffused information","volume":"16","author":"Chen","year":"2014","journal-title":"Acm Trans. Inf. Syst. Secur. Tissec"},{"key":"ref_19","first-page":"43","article-title":"How Phishing Pages Look Like?","volume":"18","author":"Bartoli","year":"2018","journal-title":"Cybern. Inf. Technol."},{"key":"ref_20","first-page":"405","article-title":"Detecting suspicious profiles using text analysis within social media","volume":"73","author":"Alami","year":"2015","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Alami, S., and Elbeqqali, O. (2015, January 20\u201321). Cybercrime profiling: Text mining techniques to detect and predict criminal activities in microblog posts. Proceedings of the 10th International Conference on Intelligent Systems: Theories and Applications (SITA), Rabat, Morocco.","DOI":"10.1109\/SITA.2015.7358435"},{"key":"ref_22","unstructured":"Rasheed, H.R., Khan, F.H., Bashir, S., and Fatima, I. (2018, January 23). Detecting Suspicious Discussion on Online Forums Using Data Mining. Proceedings of the International Conference on Intelligent Technologies and Applications, Singapore."},{"key":"ref_23","unstructured":"Brounstein, T.R., Killian, A.L., Skryzalin, J., and Garcia, D. (2017). Stylometric and Temporal Techniques for Social Media Account Resolution, Technical Report for Sandia National Lab. (SNL-NM)."},{"key":"ref_24","unstructured":"Brounstein, T.R. (2019). Social Media Account Resolution and Verification, Technical Report for Sandia National Lab. (SNL-NM)."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ishio, T., Maeda, N., Shibuya, K., and Inoue, K. (2018, January 23\u201329). Cloned Buggy Code Detection in Practice Using Normalized Compression Distance. Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), Madrid, Spain.","DOI":"10.1109\/ICSME.2018.00022"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alrabaee, S., Shirani, P., Wang, L., Debbabi, M., and Hanna, A. (2018, January 3\u20137). On leveraging coding habits for effective binary authorship attribution. Proceedings of the European Symposium on Research in Computer Security, Barcelona, Spain.","DOI":"10.1007\/978-3-319-99073-6_2"},{"key":"ref_27","unstructured":"de la Torre-Abaitua, G., Lago-Fern\u00e1ndez, L.F., and Arroyo, D. (2019). A compression based framework for the detection of anomalies in heterogeneous data sources. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"de la Torre-Abaitua, G., Lago-Fern\u00e1ndez, L.F., Arroyo, D., Abaitua, G., Lago-Fern\u00e1ndez, L.F., and Arroyo, D. (2017). A Parameter-Free Method for the Detection of Web Attacks. International Joint Conference SOCO\u201917-CISIS\u201917-ICEUTE\u201917 Le\u00f3n, Springer.","DOI":"10.1007\/978-3-319-67180-2_64"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1109\/TIFS.2018.2878172","article-title":"Compression Analytics for Classification and Anomaly Detection within Network Communication","volume":"14","author":"Ting","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Desnos, A. (2012, January 4\u20137). Android: Static analysis using similarity distance. Proceedings of the 2012 45th Hawaii International Conference on System Sciences, Maui, HI, USA.","DOI":"10.1109\/HICSS.2012.114"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Kishore, S., Kumar, R., and Rajan, S. (2018, January 22\u201324). Towards Accuracy in Similarity Analysis of Android Applications. Proceedings of the International Conference on Information Systems Security, Funchal, Portugal.","DOI":"10.1007\/978-3-030-05171-6_8"},{"key":"ref_32","first-page":"2148","article-title":"Java Birthmarks\u2013Detecting the Software Theft\u2013","volume":"88","author":"Tamada","year":"2019","journal-title":"Ieice Trans. Inf. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Raff, E., and Nicholas, C. (2017, January 3). Malware classification and class imbalance via stochastic hashed lzjd. Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, New York, NY, USA.","DOI":"10.1145\/3128572.3140446"},{"key":"ref_34","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., and Nazario, J. (2017, January 5\u20137). Automated classification and analysis of internet malware. Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Gold Goast, Australia."},{"key":"ref_35","unstructured":"Alshahwan, N., Barr, E.T., Clark, D., and Danezis, G. (2015). Detecting malware with information complexity. arXiv."},{"key":"ref_36","unstructured":"Raff, E. (2018). Malware Detection and Cyber Security via Compression, University of Maryland."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Faridi, H., Srinivasagopalan, S., and Verma, R. (2018, January 17\u201320). Performance Evaluation of Features and Clustering Algorithms for Malware. Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW), Singapore.","DOI":"10.1109\/ICDMW.2018.00010"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Carvalho, J.M., Br\u00e3s, S., Ferreira, J., Soares, S.C., and Pinho, A.J. (2017, January 20\u201323). Impact of the acquisition time on ECG compression-based biometric identification systems. Proceedings of the Iberian Conference on Pattern Recognition and Image Analysis, Faro, Portugal.","DOI":"10.1007\/978-3-319-58838-4_19"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.patcog.2004.05.014","article-title":"ECG to identify individuals","volume":"38","author":"Israel","year":"2019","journal-title":"Pattern Recognit."},{"key":"ref_40","first-page":"591","article-title":"ECG authentication for mobile devices","volume":"65","year":"2015","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_41","unstructured":"Carvalho, J.M., Br\u00e1s, S., and Pinho, A.J. (2018). Compression-Based ECG Biometric Identification Using a Non-fiducial Approach. arXiv."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"467","DOI":"10.3389\/fpsyg.2018.00467","article-title":"Biometric and emotion identification: An ECG compression based method","volume":"9","author":"Ferreira","year":"2018","journal-title":"Front. Psychol."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Resende, J.S., Sousa, P.R., Martins, R., and Antunes, L. (2019). Breaking MPC implementations through compression. Int. J. Inf. Secur.","DOI":"10.1007\/s10207-018-0424-2"},{"key":"ref_44","first-page":"122","article-title":"Transforming the \u2018weakest link\u2019\u2014A human\/computer interaction approach to usable and effective security","volume":"19","author":"Sasse","year":"2019","journal-title":"Technol. J."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/SURV.2013.032213.00009","article-title":"Phishing detection: A literature survey","volume":"15","author":"Khonji","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Parsons, K., McCormac, A., Pattinson, M., Butavicius, M., and Jerram, C. (2013, January 8\u201310). Phishing for the truth: A scenario-based experiment of users\u2019 behavioural response to emails. Proceedings of the IFIP International Information Security Conference, Auckland, New Zealand.","DOI":"10.1007\/978-3-642-39218-4_27"},{"key":"ref_47","unstructured":"Zheng, L., Narayan, S., Risher, M.E., Wei, S.K., Ramarao, V.T., and Kundu, A. (2013). Spam Filtering Based on Statistics and Token Frequency Modeling. (8,364,766), US Patent."},{"key":"ref_48","unstructured":"(2019, December 03). Spam Track, Available online: https:\/\/trec.nist.gov\/data\/spam.html."},{"key":"ref_49","unstructured":"Dorner, D. (1997). The Logic of Failure: Recognizing and Avoiding Error in Complex Situations, Basic Books."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Wertheimer, M. (1938). Gestalt Theory, American Psychological Association.","DOI":"10.1037\/11496-001"},{"key":"ref_51","unstructured":"(2019, December 03). PhishTank. Available online: https:\/\/www.phishtank.com\/index.php."},{"key":"ref_52","first-page":"91","article-title":"Software Library for Authorship Identification","volume":"V","author":"Ivanov","year":"2015","journal-title":"Digit. Present. Preserv. Cult. Sci. Herit."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"S24","DOI":"10.1016\/j.diin.2010.05.004","article-title":"The Normalised Compression Distance as a file fragment classifier","volume":"7","author":"Axelsson","year":"2010","journal-title":"Digit. Investig."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Axelsson, S. (2010, January 15\u201318). Using normalized compression distance for classifying file fragments. Proceedings of the 2010 International Conference on Availability, Reliability and Security, Krakow, Poland.","DOI":"10.1109\/ARES.2010.100"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/j.patrec.2014.01.019","article-title":"Authorship analysis based on data compression","volume":"42","author":"Cerra","year":"2014","journal-title":"Pattern Recognit. Lett."},{"key":"ref_56","unstructured":"Kulekci, M.O., and Kamasak, M.E. (2019). A Method of Privacy Preserving Document Similarity Detection. (App. 16\/082,272), US Patent."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Kulekci, M.O., Habib, I., and Aghabaiglou, A. (2019, January 2\u20134). Privacy\u2013Preserving Text Similarity via Non-Prefix-Free Codes. Proceedings of the International Conference on Similarity Search and Applications, Newark, NJ, USA.","DOI":"10.1007\/978-3-030-32047-8_9"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Lambers, M., and Veenman, C.J. (2009, January 13\u201314). Forensic authorship attribution using compression distances to prototypes. Proceedings of the International Workshop on Computational Forensics, The Hague, The Netherlands.","DOI":"10.1007\/978-3-642-03521-0_2"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1126\/science.aao2998","article-title":"The science of fake news","volume":"359","author":"Lazer","year":"2018","journal-title":"Science"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1186\/s13673-019-0185-6","article-title":"Detection and classification of social media-based extremist affiliations using sentiment analysis techniques","volume":"9","author":"Ahmad","year":"2019","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"ref_61","first-page":"1","article-title":"Cyberbullying detection system on twitter","volume":"1","author":"Hon","year":"2015","journal-title":"IJABM"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1007\/s00354-017-0015-1","article-title":"Predicting the Relevance of Social Media Posts Based on Linguistic Features and Journalistic Criteria","volume":"35","author":"Pinto","year":"2017","journal-title":"New Gener. Comput."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.diin.2019.02.001","article-title":"Evidence collection and forensics on social networks: Research challenges and directions","volume":"28","author":"Arshad","year":"2019","journal-title":"Digit. Investig."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Li, R., Wang, S., Deng, H., Wang, R., and Chang, K.C.C. (2012, January 12). Towards social user profiling: Unified and discriminative influence model for inferring home locations. Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China.","DOI":"10.1145\/2339530.2339692"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Acar, Y., Backes, M., Fahl, S., Kim, D., Mazurek, M.L., and Stransky, C. (2016, January 22\u201326). You get where you\u2019re looking for: The impact of information sources on code security. Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2016.25"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.infsof.2017.04.005","article-title":"On code reuse from StackOverflow: An exploratory study on Android apps","volume":"88","author":"Abdalkareem","year":"2017","journal-title":"Inf. Softw. Technol."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Thomas, T.W., Tabassum, M., Chu, B., and Lipford, H. (2018, January 21). Security during application development: An application security expert perspective. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal, QC, Canada.","DOI":"10.1145\/3173574.3173836"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M.L., and Fahl, S. (2017, January 23). Developers need support, too: A survey of security advice for software developers. Proceedings of the 2017 IEEE Cybersecurity Development (SecDev), Cambridge, MA, USA.","DOI":"10.1109\/SecDev.2017.17"},{"key":"ref_69","unstructured":"He, W., Tian, X., and Shen, J. (2015). Examining Security Risks of Mobile Banking Applications through Blog Mining. MAICS, 103\u2013108."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Vaarandi, R., Blumbergs, B., and Kont, M. (2018, January 23\u201327). An unsupervised framework for detecting anomalous messages from syslog log files. Proceedings of the NOMS 2018-2018 IEEE\/IFIP Network Operations and Management Symposium, Taipei, Taiwan.","DOI":"10.1109\/NOMS.2018.8406283"},{"key":"ref_71","unstructured":"(2019, December 03). HTTP DATASET CSIC 2010. Available online: http:\/\/www.isi.csic.es\/dataset\/l."},{"key":"ref_72","unstructured":"(2019, December 03). Intrusion Detection Evaluation Dataset (ISCXIDS2012). Available online: https:\/\/www.unb.ca\/cic\/datasets\/ids.html."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.future.2018.12.028","article-title":"SaaS: A situational awareness and analysis system for massive android malware detection","volume":"95","author":"Zhang","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"You, I., and Yim, K. (2010, January 4\u20136). Malware obfuscation techniques: A brief survey. Proceedings of the 2010 International conference on broadband, wireless computing, communication and applications, Fukuoka, Japan.","DOI":"10.1109\/BWCCA.2010.85"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Men\u00e9ndez, H.D., and Llorente, J.L. (2019). Mimicking Anti-Viruses with Machine Learning and Entropy Profiles. Entropy, 21.","DOI":"10.3390\/e21050513"},{"key":"ref_76","unstructured":"Ronen, R., Radu, M., Feuerstein, C., Yom-Tov, E., and Ahmadi, M. (2018). Microsoft malware classification challenge. arXiv."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"303","DOI":"10.3233\/JCS-2007-15301","article-title":"Analyzing worms and network traffic using compression","volume":"15","author":"Wehner","year":"2007","journal-title":"J. Comput. Secur."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1016\/j.eswa.2018.10.011","article-title":"The arms race: Adversarial search defeats entropy used to detect malware","volume":"118","author":"Bhattacharya","year":"2019","journal-title":"Expert Syst. Appl."},{"key":"ref_79","first-page":"23","article-title":"Drebin: Effective and explainable detection of android malware in your pocket","volume":"14","author":"Arp","year":"2014","journal-title":"Ndss"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Ekhtoom, D., Al-Ayyoub, M., Al-Saleh, M., Alsmirat, M., and Hmeidi, I. (December, January 29). A compression-based technique to classify metamorphic malware. Proceedings of the 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco.","DOI":"10.1109\/AICCSA.2016.7945801"},{"key":"ref_81","unstructured":"Lee, J. (2013). Compression-Based Analysis of Metamorphic Malware. [Master\u2019s Thesis, San Jose State University]."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MC.2015.134","article-title":"Is secure and usable smartphone authentication asking too much?","volume":"48","author":"Lindqvist","year":"2015","journal-title":"Computer"},{"key":"ref_83","unstructured":"Davidson, S., Smith, D., Yang, C., and Cheah, S. (2019, December 03). Smartwatch User Identification as a Means of Authentication. Available online: https:\/\/pdfs.semanticscholar.org\/989c\/b3f52f9c3d31c305eeb251afd1a7b6e0aeb0.pdf."},{"key":"ref_84","first-page":"47","article-title":"Bridging the chasm: A survey of software engineering practice in scientific programming","volume":"50","author":"Storer","year":"2017","journal-title":"Acm Comput. Surv. Csur"},{"key":"ref_85","unstructured":"Naylor, T.H., and Finger, J.M. (2019). Verification of computer simulation models. Manag. Sci., 14."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Yao, A.C. (1982, January 3\u20135). Protocols for secure computations. Proceedings of the 23rd annual symposium on foundations of computer science (sfcs 1982), Chicago, IL, USA.","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Yao, A.C. (1986, January 27\u201329). How to generate and exchange secrets. Proceedings of the 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), Toronto, ON, Canada.","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Yao, A.C. (1982, January 3\u20135). Theory and application of trapdoor functions. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), Chicago, IL, USA.","DOI":"10.1109\/SFCS.1982.45"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Araki, T., Furukawa, J., Lindell, Y., Nof, A., and Ohara, K. (, January 24\u201328). High-throughput semi-honest secure three-party computation with an honest majority. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/2976749.2978331"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., and Zohner, M. (2015). ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., and Smart, N.P. (2013, January 9\u201313). Practical covertly secure MPC for dishonest majority\u2014Or: Breaking the SPDZ limits. Proceedings of the European Symposium on Research in Computer Security, Egham, UK.","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"ref_92","first-page":"309","article-title":"TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation","volume":"2015","author":"Frederiksen","year":"2015","journal-title":"Iacr Cryptol. Eprint Arch."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V., Nielsen, J.B., Rosulek, M., Trieu, N., and Trifiletti, R. (November, January 30). DUPLO: Unifying cut-and-choose for garbled circuits. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, NJ, USA.","DOI":"10.1145\/3133956.3133991"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"S94","DOI":"10.1016\/j.diin.2017.06.004","article-title":"Availability of datasets for digital forensics\u2013and what is missing","volume":"22","author":"Grajeda","year":"2017","journal-title":"Digit. Investig."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/12\/1196\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:40:38Z","timestamp":1760190038000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/21\/12\/1196"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,5]]},"references-count":94,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["e21121196"],"URL":"https:\/\/doi.org\/10.3390\/e21121196","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2019,12,5]]}}}