{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:51:22Z","timestamp":1725832282996},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238135"},{"type":"electronic","value":"9783319238142"}],"license":[{"start":{"date-parts":[[2015,10,15]],"date-time":"2015-10-15T00:00:00Z","timestamp":1444867200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-23814-2_30","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T05:57:52Z","timestamp":1444802272000},"page":"267-273","source":"Crossref","is-referenced-by-count":0,"title":["Local Statistic Embedding for Malware Behaviour Modelling"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,15]]},"reference":[{"key":"30_CR1","unstructured":"Antivirus is dead, says maker of Norton Antivirus \n                    http:\/\/www.pcworld.com\/article\/2150743\/antivirus-is-dead-says-maker-of-norton-antivirus.html"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Claise, B.: Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) (2004)","DOI":"10.17487\/rfc3954"},{"key":"30_CR3","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. In: Symposium on Opearting Systems Design and Implementation (OSDI). USENIX Association (2004)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Francis, J., Wang, S., State, R., Engel, T.: Bottrack: tracking botnets using netflow and pagerank. In: Proceedings of IFIP\/TC6 Networking (2011)","DOI":"10.1007\/978-3-642-20757-0_1"},{"key":"30_CR5","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S. Garc\u00eda","year":"2014","unstructured":"Garcia, S., Grill, M., Stiborek, H., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. J. Elsevier 45, 100\u2013123 (2014)","journal-title":"Computers & Security"},{"issue":"5","key":"30_CR6","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10207-011-0132-7","volume":"10","author":"D Kong","year":"2011","unstructured":"Kong, D., Jhi, Y.C., Gong, T., Zhu, S., Liu, P., Xi, H.: SAS: semantics aware signature generation for polymorphic worm detection. Int. J. Inf. Secur. 10(5), 269\u2013283 (2011)","journal-title":"Int. J. Inf. Secur."},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1145\/1030194.1015492","volume":"34","author":"A Lakhina","year":"2004","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. ACM SIGCOMM Comput. Commun. Rev. 34, 357\u2013374 (2004)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/1090191.1080118","volume":"35","author":"A Lakhina","year":"2005","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. ACM SIGCOMM Comput. Commun. Rev. 35, 217\u2013228 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"30_CR9","unstructured":"New Havex malware variants target industrial control system and SCADA users. \n                    http:\/\/www.pcworld.com\/article\/2367240\/new-havex-malware-variants-target-industrial-control-system-and-scada-users.html"},{"key":"30_CR10","unstructured":"SNORT. Project homepage. \n                    http:\/\/www.snort.org\/"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing and Communications Challenges 7"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23814-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T02:24:49Z","timestamp":1559269489000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23814-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,15]]},"ISBN":["9783319238135","9783319238142"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23814-2_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,15]]}}}