{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:56:50Z","timestamp":1762390610995},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319075686"},{"type":"electronic","value":"9783319075693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07569-3_3","type":"book-chapter","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T10:15:55Z","timestamp":1400580955000},"page":"29-42","source":"Crossref","is-referenced-by-count":1,"title":["Four Years of Botnet Hunting: An Assessment"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Berger-Sabbatel","sequence":"first","affiliation":[]},{"given":"Andrzej","family":"Duda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Berger-Sabbatel, G., Korczy\u0144ski, M., Duda, A.: Architecture of a Platform for Malware Analysis and Confinement. In: Proceedings of the MCSS 2010: Multimedia Communications, Services and Security, Cracow, Poland (June 2010)"},{"key":"3_CR2","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-21512-4_25","volume-title":"Multimedia Communications, Services and Security","author":"G. Berger-Sabbatel","year":"2011","unstructured":"Berger-Sabbatel, G., Duda, A.: Analysis of Malware Network Activity. In: Dziech, A., Czy\u017cewski, A. (eds.) MCSS 2011. CCIS, vol.\u00a0149, pp. 207\u2013215. Springer, Heidelberg (2011)"},{"key":"3_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-30721-8_3","volume-title":"Multimedia Communications, Services and Security","author":"G. Berger-Sabbatel","year":"2012","unstructured":"Berger-Sabbatel, G., Duda, A.: Classification of Malware Network Activity. In: Dziech, A., Czy\u017cewski, A. (eds.) MCSS 2012. CCIS, vol.\u00a0287, pp. 24\u201335. Springer, Heidelberg (2012)"},{"key":"3_CR4","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-38559-9_9","volume-title":"Multimedia Communications, Services and Security","author":"M. Korczy\u0144ski","year":"2013","unstructured":"Korczy\u0144ski, M., Berger-Sabbatel, G., Duda, A.: Two Methods for Detecting Malware. In: Dziech, A., Czy\u017cewski, A. (eds.) MCSS 2013. CCIS, vol.\u00a0368, pp. 95\u2013106. Springer, Heidelberg (2013)"},{"key":"3_CR5","first-page":"4","volume-title":"Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, HotBots 2007","author":"N. Provos","year":"2007","unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser analysis of web-based malware. In: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, HotBots 2007, p. 4. USENIX Association, Berkeley (2007)"},{"key":"3_CR6","first-page":"196","volume-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011","author":"G. Yan","year":"2011","unstructured":"Yan, G., Chen, G., Eidenbenz, S., Li, N.: Malware propagation in online social networks: Nature, dynamics, and defense implications. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 196\u2013206. ACM, New York (2011)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Invernizzi, L., Benvenuti, S., Comparetti, P.M., Kruegel, C., Vigna, G.: EVILSEED: A Guided Approach to Finding Malicious Web Pages. In: Proceedings of the 33th IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA (May 2012)","DOI":"10.1109\/SP.2012.33"},{"key":"3_CR8","unstructured":"Steggink, M., Idziejczak, I.: Detection of peer-to-peer botnets. Research report for system and network engineering, University of Amsterdam, The Netherlands (2008), \n                  \n                    http:\/\/work6.delaat.net\/rp\/2007-2008\/p22\/report.pdf"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Caglayan, A., Toothaker, M., Drapaeau, D., Burke, D., Eaton, G.: Behavioral analysis of fast flux service networks. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW 2009, pp. 48:1\u201348:4. ACM, New York (2009)","DOI":"10.1145\/1558607.1558662"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Nazario, J., Holz, T.: As the net churns: Fast-flux botnet observations. In: 3rd International Conference on Malicious and Unwanted Software, pp. 24\u201331 (October 2008)","DOI":"10.1109\/MALWARE.2008.4690854"},{"key":"3_CR11","unstructured":"Zhuge, J., Holz, T., Han, X., Guo, J., Zou, W.: Characterizing the irc-based botnet phenomenon. Technical report, Department for Mathematics and Computer Science, University of Mannheim; TR-2007-010 (2007)"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07569-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T17:49:38Z","timestamp":1558892978000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07569-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319075686","9783319075693"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07569-3_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}