{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:36:42Z","timestamp":1766486202702,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630065"},{"type":"electronic","value":"9783030630072"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63007-2_36","type":"book-chapter","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:02:39Z","timestamp":1606089759000},"page":"465-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Graph-Based Approach for IoT Botnet Detection Using Reinforcement Learning"],"prefix":"10.1007","author":[{"given":"Quoc-Dung","family":"Ngo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huy-Trung","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hoang-Long","family":"Pham","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hoang Hanh-Nhan","family":"Ngo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Doan-Hieu","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cong-Minh","family":"Dinh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuan-Hanh","family":"Vu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,11,23]]},"reference":[{"key":"36_CR1","unstructured":"Internet of Things - number of connected devices worldwide 2015\u20132025. https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/. Accessed 3 May 2020"},{"key":"36_CR2","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: Proceedings of the 26th {USENIX} Security Symposium ({USENIX} Security 2017, pp. 1093\u20131110 (2017)"},{"issue":"2","key":"36_CR3","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino, E., Islam, N.: Botnets and Internet of Things security. Computer 50(2), 76\u201379 (2017). https:\/\/doi.org\/10.1109\/MC.2017.62","journal-title":"Computer"},{"key":"36_CR4","unstructured":"Flashpoint: Mirai Botnet Linked to Dyn DNS DDoS Attacks. https:\/\/www.flashpoint-intel.com\/blog\/cybercrime\/mirai-botnet-linked-dyn-dns-ddos-attacks. Accessed 2 May 2020"},{"issue":"1","key":"36_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10207-019-00439-w","volume":"19","author":"S Ozawa","year":"2019","unstructured":"Ozawa, S., Ban, T., Hashimoto, N., Nakazato, J., Shimamura, J.: A study of IoT malware activities using association rule learning for darknet sensor data. Int. J. Inf. Secur. 19(1), 83\u201392 (2019). https:\/\/doi.org\/10.1007\/s10207-019-00439-w","journal-title":"Int. J. Inf. Secur."},{"key":"36_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-030-38557-6_6","volume-title":"Handbook of Big Data Privacy","author":"W Peters","year":"2020","unstructured":"Peters, W., Dehghantanha, A., Parizi, R.M., Srivastava, G.: A comparison of state-of-the-art machine learning models for OpCode-based IoT malware detection. In: Choo, K.-K.R., Dehghantanha, A. (eds.) Handbook of Big Data Privacy, pp. 109\u2013120. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38557-6_6"},{"issue":"1","key":"36_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10207-019-00437-y","volume":"19","author":"H Takase","year":"2019","unstructured":"Takase, H., Kobayashi, R., Kato, M., Ohmura, R.: A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information. Int. J. Inf. Secur. 19(1), 71\u201381 (2019). https:\/\/doi.org\/10.1007\/s10207-019-00437-y","journal-title":"Int. J. Inf. Secur."},{"key":"36_CR8","doi-asserted-by":"publisher","unstructured":"Chang, K.-C., Tso, R., Tsai, M.-C.: IoT sandbox: to analysis IoT malware Zollard. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, pp. 1\u20138 (2017). https:\/\/doi.org\/10.1145\/3018896.3018898","DOI":"10.1145\/3018896.3018898"},{"key":"36_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.04.005","author":"Q-D Ngo","year":"2020","unstructured":"Ngo, Q.-D., et al.: A survey of IoT malware and detection methods based on static features. ICT Express (2020). https:\/\/doi.org\/10.1016\/j.icte.2020.04.005","journal-title":"ICT Express"},{"issue":"5","key":"36_CR10","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s10207-019-00475-6","volume":"19","author":"H-T Nguyen","year":"2019","unstructured":"Nguyen, H.-T., Ngo, Q.-D., Le, V.-H.: A novel graph-based approach for IoT botnet detection. Int. J. Inf. Secur. 19(5), 567\u2013577 (2019). https:\/\/doi.org\/10.1007\/s10207-019-00475-6","journal-title":"Int. J. Inf. Secur."},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/0004-3702(70)90007-X","volume":"1","author":"I Pohl","year":"1970","unstructured":"Pohl, I.: Heuristic search viewed as path finding in a graph. Artif. Intell. 1, 193\u2013204 (1970)","journal-title":"Artif. Intell."},{"issue":"3","key":"36_CR12","first-page":"51","volume":"4","author":"R Anbuselvi","year":"2013","unstructured":"Anbuselvi, R., Phil, M.: Path finding solutions for grid based graph. Adv. Comput. Int. J. 4(3), 51\u201360 (2013)","journal-title":"Adv. Comput. Int. J."},{"key":"36_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-38557-6_5","volume-title":"Handbook of Big Data Privacy","author":"S Yousefi","year":"2020","unstructured":"Yousefi, S., Derakhshan, F., Karimipour, H.: Applications of big data analytics and machine learning in the Internet of Things. In: Choo, K.-K.R., Dehghantanha, A. (eds.) Handbook of Big Data Privacy, pp. 77\u2013108. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-38557-6_5"},{"key":"36_CR14","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1016\/j.jnca.2012.10.004","volume":"36","author":"R Islam","year":"2013","unstructured":"Islam, R., Tian, R., Batten, L.M., Versteeg, S.: Classification of malware based on integrated static and dynamic features. J. Netw. Comput. Appl. 36, 646\u2013656 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"36_CR15","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","volume":"35","author":"L Xiao","year":"2018","unstructured":"Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning. IEEE Signal Process. Mag. 35(5), 41\u201349 (2018)","journal-title":"IEEE Signal Process. Mag."},{"issue":"1","key":"36_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-018-0125-x","volume":"8","author":"A Souri","year":"2018","unstructured":"Souri, A., Hosseini, R.: A state-of-the-art survey of malware detection approaches using data mining techniques. Hum.-Centric Comput. Inf. Sci. 8(1), 1\u201322 (2018). https:\/\/doi.org\/10.1186\/s13673-018-0125-x","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"issue":"3","key":"36_CR17","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/sym12030410","volume":"12","author":"TC Truong","year":"2020","unstructured":"Truong, T.C., et al.: Intelligence in the cyber domain: offense and defense. Symmetry 12(3), 410 (2020)","journal-title":"Symmetry"},{"key":"36_CR18","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin, Y., et al.: Machine learning and deep learning methods for cybersecurity. IEEE Access 6, 35365\u201335381 (2018)","journal-title":"IEEE Access"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Blount, J.J., et al.: Adaptive rule-based malware detection employing learning classifier systems: a proof of concept. In: 35th Annual Computer Software and Applications Conference Workshops, pp. 110\u2013115 (2011)","DOI":"10.1109\/COMPSACW.2011.28"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Urbanowicz, R.J., et al.: Learning classifier systems: a complete introduction, review, and roadmap. J. Artif. Evol. Appl. 2009(1), 1\u201325 (2009). https:\/\/doi.org\/10.1155\/2009\/736398","DOI":"10.1155\/2009\/736398"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Wu, C., et al.: Enhancing machine learning based malware detection model by reinforcement learning. In: Proceedings of the 8th International Conference on Communication and Network Security, pp. 74\u201378 (2018)","DOI":"10.1145\/3290480.3290494"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Su, J., Vargas, D.V., Prasad, S., Sgandurra, D., Feng, Y., Sakurai, K.: Lightweight classification of IoT malware based on image recognition. In: IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 664\u2013669 (2018)","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"36_CR23","first-page":"91","volume":"37","author":"A Pekta\u015f","year":"2017","unstructured":"Pekta\u015f, A., et al.: Classification of malware families based on runtime behaviors. J. Inf. Secur. Appl. 37, 91\u2013100 (2017)","journal-title":"J. Inf. Secur. Appl."},{"issue":"10","key":"36_CR24","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1109\/TMC.2017.2687918","volume":"16","author":"L Xiao","year":"2017","unstructured":"Xiao, L., et al.: Cloud-based malware detection game for mobile devices with offloading. IEEE Trans. Mob. Comput. 16(10), 2742\u20132750 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"36_CR25","doi-asserted-by":"publisher","first-page":"17478","DOI":"10.1109\/ACCESS.2017.2720160","volume":"5","author":"Y Du","year":"2017","unstructured":"Du, Y., et al.: An android malware detection approach using community structures of weighted function call graphs. IEEE Access 5, 17478\u201317486 (2017)","journal-title":"IEEE Access"},{"issue":"2","key":"36_CR26","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.icte.2019.12.001","volume":"6","author":"H-T Nguyen","year":"2020","unstructured":"Nguyen, H.-T., et al.: PSI-rooted subgraph: a novel feature for IoT botnet detection using classifier algorithms. ICT Express 6(2), 128\u2013138 (2020)","journal-title":"ICT Express"},{"key":"36_CR27","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.: A deep recurrent neural network based approach for Internet of Things malware threat hunting. Future Gener. Comput. Syst. 85, 88\u201396 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.03.007","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63007-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:16:41Z","timestamp":1606090601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63007-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630065","9783030630072"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63007-2_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Da Nang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}