{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T14:44:42Z","timestamp":1726238682633},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031490170"},{"type":"electronic","value":"9783031490187"}],"license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-49018-7_4","type":"book-chapter","created":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T23:02:21Z","timestamp":1701039741000},"page":"46-62","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Uncovering Manipulated Files Using Mathematical Natural Laws"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Fernandes","sequence":"first","affiliation":[]},{"given":"S\u00e9amus","family":"\u00d3 Ciardhu\u00e1in","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"4_CR1","unstructured":"Adobe: Zero day malware threat prevention, July 2015. chrome-extension:\/\/efaidnbmnnnibpcajpcglclefindmkaj\/ https:\/\/www.oracle.com\/a\/otn\/docs\/zero-day-malware-protection-brief.pdf"},{"key":"4_CR2","unstructured":"Arno Berger, T.P.H.: An Introduction to Benford\u2019s Law. Princeton University Press (2015). https:\/\/www.ebook.de\/de\/product\/23323656\/arno_berger_theodore_p_hill_an_introduction_to_benford_s_law.html"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2013.09.007","volume":"40","author":"L Arshadi","year":"2014","unstructured":"Arshadi, L., Jahangir, A.H.: Benford\u2019s law behavior of internet traffic. J. Netw. Comput. Appl. 40, 194\u2013205 (2014). https:\/\/doi.org\/10.1016\/j.jnca.2013.09.007","journal-title":"J. Netw. Comput. Appl."},{"issue":"3\u20134","key":"4_CR4","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10472-017-9564-8","volume":"81","author":"O Caelen","year":"2017","unstructured":"Caelen, O.: A Bayesian interpretation of the confusion matrix. Ann. Math. Artif. Intell. 81(3\u20134), 429\u2013450 (2017). https:\/\/doi.org\/10.1007\/s10472-017-9564-8","journal-title":"Ann. Math. Artif. Intell."},{"issue":"1","key":"4_CR5","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1073\/pnas.1806617115","volume":"116","author":"A Cerioli","year":"2018","unstructured":"Cerioli, A., Barabesi, L., Cerasa, A., Menegatti, M., Perrotta, D.: Newcomb-Benford law and the detection of frauds in international trade. Proc. Natl. Acad. Sci. 116(1), 106\u2013115 (2018). https:\/\/doi.org\/10.1073\/pnas.1806617115","journal-title":"Proc. Natl. Acad. Sci."},{"key":"4_CR6","unstructured":"Check Point: Snake Keylogger (2022). https:\/\/research.checkpoint.com\/2022\/18th-july-threat-intelligence-report\/"},{"key":"4_CR7","unstructured":"Collins, J.C.: Using excel and Benford\u2019s law to detect fraud, April 2017. https:\/\/www.journalofaccountancy.com\/issues\/2017\/apr\/excel-and-benfords-law-to-detect-fraud.html"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Corum, A., Jenkins, D., Zheng, J.: Robust PDF malware detection with image visualization and processing techniques, June 2019. https:\/\/doi.org\/10.1109\/icdis.2019.00024","DOI":"10.1109\/icdis.2019.00024"},{"issue":"7","key":"4_CR9","doi-asserted-by":"publisher","first-page":"102","DOI":"10.3390\/jimaging7070102","volume":"7","author":"S Ferreira","year":"2021","unstructured":"Ferreira, S., Antunes, M., Correia, M.E.: Exposing manipulated photos and videos in digital forensics analysis. J. Imaging 7(7), 102 (2021). https:\/\/doi.org\/10.3390\/jimaging7070102","journal-title":"J. Imaging"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Gopaldinne, S.R., Kaur, H., Kaur, P., Kaur, G., Madhuri: Overview of PDF malware classifiers. In: 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM). IEEE, April 2021. https:\/\/doi.org\/10.1109\/iciem51511.2021.9445341","DOI":"10.1109\/iciem51511.2021.9445341"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Gottwalt, F., Waller, A., Liu, W.: Natural laws as a baseline for network anomaly detection. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 370\u2013377 (2016). https:\/\/doi.org\/10.1109\/TrustCom.2016.0086","DOI":"10.1109\/TrustCom.2016.0086"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Hajdarevic, K., Pattinson, C., Besic, I.: Improving learning skills in detection of denial of service attacks with newcombe - Benford\u2019s law using interactive data extraction and analysis. TEM J., 527\u2013534 (2022). https:\/\/doi.org\/10.18421\/tem112-05","DOI":"10.18421\/tem112-05"},{"key":"4_CR13","unstructured":"Hill, T.P.: The significant-digit phenomenon 102(4), 322\u2013327. https:\/\/digitalcommons.calpoly.edu\/cgi\/viewcontent.cgi?article=1041 &context=rgp_rsr"},{"key":"4_CR14","unstructured":"ISO: ISO 32000\u20131:2008document management - portable document format - part 1: Pdf 1.7, July 2008. https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:32000:-1:ed-1:v1:en"},{"key":"4_CR15","unstructured":"ISO: ISO 32000\u20132:2020document management - portable document format - part 2: Pdf 2.0, December 2020. https:\/\/www.iso.org\/standard\/75839.html"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Issakhani, M., Victor, P., Tekeoglu, A., Lashkari, A.: PDF malware detection based on stacking learning. In: Proceedings of the 8th International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, pp. 562\u2013570. INSTICC, SciTePress (2022). https:\/\/doi.org\/10.5220\/0010908400003120","DOI":"10.5220\/0010908400003120"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Kang, A., Jeong, Y.S., Kim, S., Woo, J.: Malicious PDF detection model against adversarial attack built from benign PDF containing JavaScript 9(22), 4764. https:\/\/doi.org\/10.3390\/app9224764","DOI":"10.3390\/app9224764"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Kurien, K.L., Chikkamannur, A.: An ameliorated hybrid model for fraud detection based on tree based algorithms and Benford\u2019s law. In: 2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC). IEEE, December 2020. https:\/\/doi.org\/10.1109\/icaecc50550.2020.9339471","DOI":"10.1109\/icaecc50550.2020.9339471"},{"issue":"3","key":"4_CR19","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1177\/0148558X20930467","volume":"37","author":"T Le","year":"2022","unstructured":"Le, T., Lobo, G.J.: Audit quality inputs and financial statement conformity to Benford\u2019s law. J. Account. Audit. Finance 37(3), 586\u2013602 (2022). https:\/\/doi.org\/10.1177\/0148558X20930467","journal-title":"J. Account. Audit. Finance"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Mainka, C., Mladenov, V., Rohlmann, S.: Shadow attacks: hiding and replacing content in signed PDFs. In: Proceedings 2021 Network and Distributed System Security Symposium. Internet Society (2021). https:\/\/doi.org\/10.14722\/ndss.2021.24117","DOI":"10.14722\/ndss.2021.24117"},{"issue":"1","key":"4_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MSEC.2018.2875879","volume":"17","author":"D Maiorca","year":"2019","unstructured":"Maiorca, D., Biggio, B.: Digital investigation of pdf files: Unveiling traces of embedded malware. IEEE Secur. Priv. 17(1), 63\u201371 (2019). https:\/\/doi.org\/10.1109\/MSEC.2018.2875879","journal-title":"IEEE Secur. Priv."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Issakhani, M., Victor, P., Tekeoglu, A., Lashkari, A.H.: PDF malware detection based on stacking learning. In: The International Conference on Information Systems Security and Privacy, February 2022. https:\/\/www.unb.ca\/cic\/datasets\/pdfmal-2022.html","DOI":"10.5220\/0010908400003120"},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Mavric, S.H.T., Yeo, C.K.: Online binary visualization for pdf documents. In: 2018 International Symposium on Consumer Technologies (ISCT). IEEE, May 2018. https:\/\/doi.org\/10.1109\/isce.2018.8408906","DOI":"10.1109\/isce.2018.8408906"},{"issue":"3","key":"4_CR24","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1109\/tsg.2020.3042897","volume":"12","author":"F Milano","year":"2021","unstructured":"Milano, F., Gomez-Exposito, A.: Detection of cyber-attacks of power systems through Benford\u2019s law. IEEE Trans. Smart Grid 12(3), 2741\u20132744 (2021). https:\/\/doi.org\/10.1109\/tsg.2020.3042897","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"4_CR25","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1108\/maj-11-2017-1717","volume":"34","author":"MJ Nigrini","year":"2019","unstructured":"Nigrini, M.J.: The patterns of the numbers used in occupational fraud schemes. Manag. Audit. J. 34(5), 606\u2013626 (2019). https:\/\/doi.org\/10.1108\/maj-11-2017-1717","journal-title":"Manag. Audit. J."},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Nunes, A., In\u00e1icio, H., Marques, R.P.: Benford\u2019s law and fraud detection in Portuguese enterprises. In: 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1\u20136 (2019). https:\/\/doi.org\/10.23919\/CISTI.2019.8760922","DOI":"10.23919\/CISTI.2019.8760922"},{"key":"4_CR27","unstructured":"POINT, C.: Cyber attack trends: 2022 mid-year report, August 2022"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Rohlmann, S., Mladenov, V., Mainka, C., Schwenk, J.: Breaking the specification: PDF certification, May 2021. https:\/\/doi.org\/10.1109\/sp40001.2021.00110","DOI":"10.1109\/sp40001.2021.00110"},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Schmitt, F., Gassen, J., Gerhards-Padilla, E.: PDF scrutinizer: detecting JavaScript-based attacks in PDF documents. In: 2012 Tenth Annual International Conference on Privacy, Security and Trust. IEEE, July 2012. https:\/\/doi.org\/10.1109\/pst.2012.6297926","DOI":"10.1109\/pst.2012.6297926"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Sergeev, A.V., Khorev, P.B.: Analysis of methods for hiding information in PDF documents and opportunities for their progress, March 2020. https:\/\/doi.org\/10.1109\/reepe49198.2020.9059117","DOI":"10.1109\/reepe49198.2020.9059117"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Sethi, K., Kumar, R., Prajapati, N., Bera, P.: A lightweight intrusion detection system using Benford\u2019s law and network flow size difference. In: 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, January 2020. https:\/\/doi.org\/10.1109\/comsnets48256.2020.9027422","DOI":"10.1109\/comsnets48256.2020.9027422"},{"issue":"3","key":"4_CR32","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1080\/19393555.2020.1723747","volume":"29","author":"P Singh","year":"2020","unstructured":"Singh, P., Tapaswi, S., Gupta, S.: Malware detection in PDF and office documents: a survey. Inf. Secur. J. Global Perspect. 29(3), 134\u2013153 (2020). https:\/\/doi.org\/10.1080\/19393555.2020.1723747","journal-title":"Inf. Secur. J. Global Perspect."},{"issue":"1","key":"4_CR33","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.aci.2018.08.003","volume":"17","author":"A Tharwat","year":"2020","unstructured":"Tharwat, A.: Classification assessment methods. Appl. Comput. Inform. 17(1), 168\u2013192 (2020). https:\/\/doi.org\/10.1016\/j.aci.2018.08.003","journal-title":"Appl. Comput. Inform."},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Wang, L., Ma, B.Q.: A concise proof of Benford\u2019s law. Fundamental Research (2023). https:\/\/doi.org\/10.1016\/j.fmre.2023.01.002. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2667325823000043","DOI":"10.1016\/j.fmre.2023.01.002"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49018-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T23:08:45Z","timestamp":1701040125000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49018-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"ISBN":["9783031490170","9783031490187"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49018-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"27 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CIARP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberoamerican Congress on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Coimbra","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ciarp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conftool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"106","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}