{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:29:02Z","timestamp":1742912942093,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030971236"},{"type":"electronic","value":"9783030971243"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97124-3_11","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T13:16:56Z","timestamp":1648646216000},"page":"123-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Botnet Detection Method Based on SCBRNN"],"prefix":"10.1007","author":[{"given":"Yafeng","family":"Xu","sequence":"first","affiliation":[]},{"given":"Kailiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1007\/s11036-019-01415-3","volume":"26","author":"K Zhang","year":"2019","unstructured":"Zhang, K., Chen, L., An, Y., et al.: A QoE test system for vehicular voice cloud services. Mob. Netw. Appl. 26, 700\u2013715 (2019)","journal-title":"Mob. Netw. Appl."},{"issue":"5","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1049\/cje.2017.07.018","volume":"26","author":"L Chen","year":"2017","unstructured":"Chen, L., Jiang, D., Bao, R., Xiong, J., Liu, F., Bei, L.: MIMO scheduling effectiveness analysis for bursty data service from view of QoE. Chin. J. Electron. 26(5), 1079\u20131085 (2017)","journal-title":"Chin. J. Electron."},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"15408","DOI":"10.1109\/ACCESS.2018.2794354","volume":"6","author":"L Chen","year":"2018","unstructured":"Chen, L., et al.: A lightweight end-side user experience data collection system for quality evaluation of multimedia communications. IEEE Access 6(1), 15408\u201315419 (2018)","journal-title":"IEEE Access"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s11036-019-01414-4","volume":"26","author":"L Chen","year":"2020","unstructured":"Chen, L., Zhang, L.: Spectral efficiency analysis for massive MIMO system under QoS constraint: an effective capacity perspective. Mob. Netw. Appl. 26, 691\u2013699 (2020)","journal-title":"Mob. Netw. Appl."},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TNSE.2021.3075428","volume":"9","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Wang, Z., Wang, W., et al.: AI-assisted energy-efficient and intelligent routing for reconfigurable wireless networks. IEEE Trans. Netw. Sci. Eng. 9, 78\u201388 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1109\/TITS.2020.3029015","volume":"22","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Huo, L., Zhang, P., et al.: Energy-efficient heterogeneous networking for electric vehicles networks in smart future cities. IEEE Trans. Intell. Transp. Syst. 22, 1868\u20131880 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"11_CR7","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/JSAC.2020.2980919","volume":"38","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Wang, Y., Lv, Z., Wang, W., Wang, H.: An energy-efficient networking approach in cloud services for IIoT networks. IEEE J. Sel. Areas Commun. 38(5), 928\u2013941 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"10","key":"11_CR8","doi-asserted-by":"publisher","first-page":"3305","DOI":"10.1109\/TITS.2017.2778939","volume":"19","author":"D Jiang","year":"2018","unstructured":"Jiang, D., Huo, L., Lv, Z., Song, H., Qin, W.: A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans. Intell. Transp. Syst. 19(10), 3305\u20133319 (2018)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Mohammadian, M.: Network security risk assessment using intelligent agents. In: 2018 International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR), Putrajaya, pp. 1\u20136 (2018)","DOI":"10.1109\/ISAMSR.2018.8540557"},{"issue":"5","key":"11_CR10","doi-asserted-by":"publisher","first-page":"137","DOI":"10.23919\/j.cc.2019.05.011","volume":"16","author":"K Huang","year":"2019","unstructured":"Huang, K., Yang, L., Fu, R., Zhou, S., Hong, Z.: HASN: a hierarchical attack surface network for system security analysis. China Commun. 16(5), 137\u2013157 (2019)","journal-title":"China Commun."},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1109\/COMST.2017.2749442","volume":"19","author":"G Vormayr","year":"2017","unstructured":"Vormayr, G., Zseby, T., Fabini, J.: Botnet communication patterns. IEEE Commun. Surv. Tutor. 19(4), 2768\u20132796 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Shafi, Q., Basit, A.: DDoS botnet prevention using blockchain in software defined internet of things. In: 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, pp. 624\u2013628 (2019)","DOI":"10.1109\/IBCAST.2019.8667147"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"94658","DOI":"10.1109\/ACCESS.2019.2927355","volume":"7","author":"W Li","year":"2019","unstructured":"Li, W., Jin, J., Lee, J.: Analysis of Botnet domain names for IoT cybersecurity. IEEE Access 7, 94658\u201394665 (2019)","journal-title":"IEEE Access"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"3707","DOI":"10.1109\/TITS.2020.3029076","volume":"22","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Wang, Z., Huo, L., et al.: A performance measurement and analysis method for software-defined networking of IoV. IEEE Trans. Intell. Transp. Syst. 22, 3707\u20133719 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TNSE.2018.2877597","volume":"7","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Wang, W., Shi, L., Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Trans. Netw. Sci. Eng. 7(1), 507\u2013519 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-018-36180-y","volume":"8","author":"B Yang","year":"2018","unstructured":"Yang, B., Bao, W., Huang, D.-S.: Inference of large-scale time-delayed gene regulatory network with parallel MapReduce cloud platform. Sci. Rep. 8(1), 1\u201311 (2018). https:\/\/doi.org\/10.1038\/s41598-018-36180-y","journal-title":"Sci. Rep."},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"41033","DOI":"10.1109\/ACCESS.2019.2902958","volume":"7","author":"B Yang","year":"2019","unstructured":"Yang, B., Bao, W.: Complex-valued ordinary differential equation modeling for time series identification. IEEE Access 7(1), 41033\u201341042 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"11_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/TNSE.2018.2861388","volume":"7","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Huo, L., Song, H.: Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans. Netw. Sci. Eng. 7(1), 80\u201390 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"2","key":"11_CR19","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TII.2019.2930226","volume":"16","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Wang, Y., Lv, Z., Qi, S., Singh, S.: Big data analysis based network behavior insight of cellular networks for industry 4.0 applications. IEEE Trans. Ind. Inform. 16(2), 1310\u20131320 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"90268","DOI":"10.1109\/ACCESS.2019.2926731","volume":"7","author":"B Yang","year":"2019","unstructured":"Yang, B., Wang, G., Bao, W.: CSE: complex-valued system with evolutionary algorithm. IEEE Access 7(1), 90268\u201390276 (2019)","journal-title":"IEEE Access"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"38947","DOI":"10.1109\/ACCESS.2018.2846740","volume":"6","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., et al.: BotDet: a system for real time botnet command and control traffic detection. IEEE Access 6, 38947\u201338958 (2018)","journal-title":"IEEE Access"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Qiu, Z., Miller, D.J., Kesidis, G.: Flow based botnet detection through semi-supervised active learning. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, pp. 2387\u20132391 (2017)","DOI":"10.1109\/ICASSP.2017.7952584"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Mai, L., Park, M.: A comparison of clustering algorithms for botnet detection based on network flow. In: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, pp. 667\u2013669 (2016)","DOI":"10.1109\/ICUFN.2016.7537117"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Dhayal, H., Kumar, J.: Botnet and P2P botnet detection strategies: a review. In: 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, pp. 1077\u20131082 (2018)","DOI":"10.1109\/ICCSP.2018.8524529"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Muhs, D., Haas, S., Strufe, T., Fischer, M.: On the robustness of random walk algorithms for the detection of unstructured P2P botnets. In: 2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF), Hamburg, pp. 3\u201314 (2018)","DOI":"10.1109\/IMF.2018.00008"},{"key":"11_CR26","unstructured":"Gallopeni, G., Rodrigues, B., Franco, M., Stiller, B.: A practical analysis on Mirai Botnet traffic. In: 2020 IFIP Networking Conference (Networking), Paris, France, pp. 667\u2013668 (2020)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Chen, S., Chen, Y., Tzeng, W.: Effective botnet detection through neural networks on convolutional features. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 372\u2013378 (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00062"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Kapre, A., Padmavathi, B.: Behaviour based botnet detection with traffic analysis and flow interavals using PSO and SVM. In: International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 718\u2013722 (2017)","DOI":"10.1109\/ICCONS.2017.8250557"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Bapat, R., et al.: Identifying malicious botnet traffic using logistic regression. In: Systems and Information Engineering Design Symposium (SIEDS), pp. 266\u2013271 (2018)","DOI":"10.1109\/SIEDS.2018.8374749"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Kant, V., Singh, E.M., Ojha, N.: An efficient flow based botnet classification using convolution neural network. In: International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 941\u2013946 (2017)","DOI":"10.1109\/ICCONS.2017.8250603"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Garg, S., Sharma, R.M.: Anatomy of botnet on application layer: mechanism and mitigation. In: International Conference for Convergence in Technology (I2CT), pp. 1024\u20131029 (2017)","DOI":"10.1109\/I2CT.2017.8226284"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97124-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T08:10:08Z","timestamp":1726906208000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97124-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030971236","9783030971243"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97124-3_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/simutools.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}