{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:58:40Z","timestamp":1743008320205,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535543"},{"type":"electronic","value":"9783031535550"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53555-0_11","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:02:10Z","timestamp":1707800530000},"page":"110-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network Scanning Detection Based on Spatiotemporal Behavior"],"prefix":"10.1007","author":[{"given":"Pengyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"11_CR1","unstructured":"Velikovi, P., et al.: Graph attention networks (2017)"},{"key":"11_CR2","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks (2016)"},{"issue":"2","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2960409","volume":"19","author":"B Rahbarinia","year":"2016","unstructured":"Rahbarinia, B., Perdisci, R., Antonakakis, M.: Efficient and accurate behavior-based tracking of malware-control domains in large ISP networks. ACM Trans. Priv. Secur. (TOPS) 19(2), 1\u201331 (2016)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Khalil, I., Yu, T., Guan, B.: Discovering malicious domains through passive DNS data graph analysis. In: Computer and Communications Security ACM (2016)","DOI":"10.1145\/2897845.2897877"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1007\/s11063-017-9666-7","volume":"48","author":"Y Shi","year":"2018","unstructured":"Shi, Y., Chen, G., Li, J.: Malicious domain name detection based on extreme machine learning. Neural Process. Lett. 48, 1347\u20131357 (2018)","journal-title":"Neural Process. Lett."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Milajerdi, S.M., et al.: Holmes: real-time apt detection through correlation of suspicious information flows. In: 2019 IEEE Symposium on Security and Privacy (SP). IEEE (2019)","DOI":"10.1109\/SP.2019.00026"},{"key":"11_CR7","unstructured":"Qingqiang, W.U.: Overview of network user behavior analysis and modelling. Digit. Libr. Forum (2015)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Pei, K., et al.: HERCULE: attack story reconstruction via community discovery on a correlated log graph. In: Proceedings of the 32Nd Annual Conference on Computer Security Applications (2016)","DOI":"10.1145\/2991079.2991122"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Bian, H.: Detecting network intrusions from authentication logs. MS thesis. University of Waterloo (2019)","DOI":"10.23919\/CNSM46954.2019.9012700"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2018.06.055","volume":"89","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., et al.: Detection of advanced persistent threat using machine-learning correlation analysis. Fut. Gener. Comput. Syst. 89, 349\u2013359 (2018)","journal-title":"Fut. Gener. Comput. Syst."},{"key":"11_CR11","unstructured":"Bowman, B., et al.: Detecting lateral movement in enterprise computer networks with unsupervised graph {AI}. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020) (2020)"},{"key":"11_CR12","unstructured":"Wang, S., et al.: Heterogeneous graph matching networks. arXiv preprint: arXiv:1910.08074 (2019)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Liu, F., et al.: Log2vec: a heterogeneous graph embedding based approach for detecting cyber threats within enterprise. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019)","DOI":"10.1145\/3319535.3363224"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Najafi, P., et al.: MalRank: a measure of maliciousness in SIEM-based knowledge graphs. In: Proceedings of the 35th Annual Computer Security Applications Conference (2019)","DOI":"10.1145\/3359789.3359791"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.comnet.2016.05.018","volume":"109","author":"M Marchetti","year":"2016","unstructured":"Marchetti, M., et al.: Analysis of high volumes of network traffic for advanced persistent threat detection. Comput. Netw. 109, 127\u2013141 (2016)","journal-title":"Comput. Netw."},{"issue":"3","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1109\/LRA.2023.3234771","volume":"8","author":"T Monninger","year":"2023","unstructured":"Monninger, T., et al.: Scene: reasoning about traffic scenes using heterogeneous graph neural networks. IEEE Robot. Autom. Lett. 8(3), 1531\u20131538 (2023)","journal-title":"IEEE Robot. Autom. Lett."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53555-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:05:39Z","timestamp":1707800739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53555-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535543","9783031535550"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53555-0_11","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}