{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:51:54Z","timestamp":1742932314315,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030019495"},{"type":"electronic","value":"9783030019501"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01950-1_20","type":"book-chapter","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:16:51Z","timestamp":1540509411000},"page":"342-357","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Community Discovery of Attribution Trace Based on Deep Learning Approach"],"prefix":"10.1007","author":[{"given":"Jian","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xiaochun","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Yongzheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"20_CR1","volume-title":"Community Detection in Social Networks","author":"P Bedi","year":"2016","unstructured":"Bedi, P., Sharma, C.: Community Detection in Social Networks. Wiley, Hoboken (2016)"},{"issue":"10","key":"20_CR2","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","volume":"2008","author":"VD Blondel","year":"2008","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. 2008(10), 155\u2013168 (2008)","journal-title":"J. Stat. Mech."},{"issue":"1","key":"20_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s13278-012-0060-1","volume":"3","author":"S Catanese","year":"2013","unstructured":"Catanese, S., Ferrara, E., Fiumara, G.: Forensic analysis of phone call networks. Soc. Netw. Anal. Min. 3(1), 15\u201333 (2013)","journal-title":"Soc. Netw. Anal. Min."},{"issue":"4","key":"20_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H Chen","year":"2004","unstructured":"Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: a general framework and some examples. Computer 37(4), 50\u201356 (2004)","journal-title":"Computer"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Chopade, P., Zhan, J., Bikdash, M.: Node attributes and edge structure for large-scale big data network analytics and community detection. In: IEEE International Symposium on Technologies for Homeland Security, pp. 1\u20138 (2015)","DOI":"10.1109\/THS.2015.7225331"},{"key":"20_CR6","unstructured":"De Meo, P., Ferrara, E., Fiumara, G.: Finding similar users in Facebook, pp. 303\u2013324 (2011)"},{"issue":"1","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjds9","volume":"1","author":"E Ferrara","year":"2012","unstructured":"Ferrara, E.: A large-scale community structure analysis in Facebook. EPJ Data Sci. 1(1), 1\u201330 (2012)","journal-title":"EPJ Data Sci."},{"issue":"13","key":"20_CR8","doi-asserted-by":"publisher","first-page":"5733","DOI":"10.1016\/j.eswa.2014.03.024","volume":"41","author":"E Ferrara","year":"2014","unstructured":"Ferrara, E., Meo, P.D., Catanese, S., Fiumara, G.: Detecting criminal organizations in mobile phone networks. Expert Syst. Appl. 41(13), 5733\u20135750 (2014)","journal-title":"Expert Syst. Appl."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"He, D., Liu, D., Jin, D., Zhang, W.: A stochastic model for detecting heterogeneous link communities in complex networks (2015)","DOI":"10.1609\/aaai.v29i1.9159"},{"issue":"7","key":"20_CR10","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1177\/1461444814554895","volume":"18","author":"D Jin","year":"2016","unstructured":"Jin, D., Chen, Z., He, D., Zhang, W.: Modeling with node degree preservation can accurately find communities. New Media Soc. 18(7), 1293\u20131309 (2016)","journal-title":"New Media Soc."},{"key":"20_CR11","unstructured":"Krizhevsky, A., Hinton, G.E.: Using very deep autoencoders for content-based image retrieval. In: Proceedings of the European Symposium on Artificial Neural Networks, ESANN 2011, Bruges, Belgium, 27\u201329 April 2011 (2012)"},{"key":"20_CR12","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"issue":"1","key":"20_CR13","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22(1), 79\u201386 (1951)","journal-title":"Ann. Math. Stat."},{"issue":"1","key":"20_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"J Leskovec","year":"2008","unstructured":"Leskovec, J., Lang, K.J., Dasgupta, A., Mahoney, M.W.: Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math. 6(1), 29\u2013123 (2008)","journal-title":"Internet Math."},{"issue":"1","key":"20_CR15","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jcss.2013.03.012","volume":"80","author":"PD Meo","year":"2014","unstructured":"Meo, P.D., Ferrara, E., Fiumara, G., Provetti, A.: Mixing local and global information for community detection in large networks. J. Comput. Syst. Sci. 80(1), 72\u201387 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"20_CR16","unstructured":"Mikolov, T., et al.: Efficient estimation of word representations in vector space. In: International Conference on Learning Representations, pp. 1\u201312 (2013)"},{"issue":"23","key":"20_CR17","doi-asserted-by":"publisher","first-page":"3311","DOI":"10.1016\/S0042-6989(97)00169-7","volume":"37","author":"BA Olshausen","year":"1997","unstructured":"Olshausen, B.A., Field, D.J.: Sparse coding with an overcomplete basis set: a strategy employed by V1? Vis. Res. 37(23), 3311\u20133325 (1997)","journal-title":"Vis. Res."},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations, pp. 701\u2013710 (2014)","DOI":"10.1145\/2623330.2623732"},{"issue":"2","key":"20_CR19","doi-asserted-by":"publisher","first-page":"1883","DOI":"10.4249\/scholarpedia.1883","volume":"4","author":"L Peterson","year":"2009","unstructured":"Peterson, L.: K-nearest neighbor. Scholarpedia 4(2), 1883 (2009)","journal-title":"Scholarpedia"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-319-68612-7_11","volume-title":"Artificial Neural Networks and Machine Learning \u2013 ICANN 2017","author":"I Rosenberg","year":"2017","unstructured":"Rosenberg, I., Sicard, G., David, E.O.: DeepAPT: nation-state APT attribution using end-to-end deep neural networks. In: Lintas, A., Rovetta, S., Verschure, P.F.M.J., Villa, A.E.P. (eds.) ICANN 2017. LNCS, vol. 10614, pp. 91\u201399. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68612-7_11"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Sch\u00f6lkopf, B., Platt, J., Hofmann, T.: Greedy layer-wise training of deep networks. In: International Conference on Neural Information Processing Systems, pp. 153\u2013160 (2006)","DOI":"10.7551\/mitpress\/7503.003.0024"},{"key":"20_CR22","unstructured":"Segal, A.: Mandiant: APT1: exposing one of china\u2019s cyber espionage units"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Wheeler, D.A., Larsen, G.N.: Techniques for cyber attack attribution (2003)","DOI":"10.21236\/ADA468859"},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Xu, J., Yun, X., Zhang, Y., Sang, Y., Cheng, Z.: NetworkTrace: probabilistic relevant pattern recognition approach to attribution trace analysis. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 691\u2013698, August 2017. https:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.301","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.301"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Yao, S., Chen, J., Du, R., Deng, L., Wang, C.: A survey of security network coding toward various attacks. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 252\u2013259 (2014)","DOI":"10.1109\/TrustCom.2014.35"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01950-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T00:04:42Z","timestamp":1698365082000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-01950-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030019495","9783030019501"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01950-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"26 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lille","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conference.imt-lille-douai.fr\/icics2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}