{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:37:38Z","timestamp":1725838658910},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319256443"},{"type":"electronic","value":"9783319256450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25645-0_1","type":"book-chapter","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T07:24:45Z","timestamp":1448263485000},"page":"3-17","source":"Crossref","is-referenced-by-count":1,"title":["Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks"],"prefix":"10.1007","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Mikhail","family":"Istomin","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Bickford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"1_CR1","unstructured":"Androguard. \n                      https:\/\/github.com\/androguard\/androguard"},{"key":"1_CR2","unstructured":"Droidbox. \n                      http:\/\/code.google.com\/p\/droidbox\/"},{"key":"1_CR3","unstructured":"Anti-Phishing Working Group: Global phishing survey: trends and domain name use in 2014. \n                      http:\/\/goo.gl\/cfPCEY"},{"issue":"2","key":"1_CR4","first-page":"1","volume":"3","author":"A Baliga","year":"2012","unstructured":"Baliga, A., Bickford, J., Daswani, N.: Triton: A carrier-based approach for detecting and mitigating mobile malware. Journal of Cyber Security 3(2), 1\u201330 (2012)","journal-title":"Journal of Cyber Security"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Boggs, N., Wang, W., Mathur, S., Coskun, B., Pincock, C.: Discovery of emergent malicious campaigns in cellular networks. In: Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC 2013, pp. 29\u201338. ACM, New York (2013)","DOI":"10.1145\/2523649.2523657"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: Seventh International World-Wide Web Conference (1998)","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/3-540-44816-0_11","volume-title":"Advances in Intelligent Data Analysis","author":"C Cortes","year":"2001","unstructured":"Cortes, C., Pregibon, D., Volinsky, C.: Communities of interest. In: Hoffmann, F., Hand, D.J., Adams, N., Fisher, D., Guimaraes, G. (eds.) IDA 2001. LNCS, vol. 2189, pp. 105\u2013114. Springer, Heidelberg (2001)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Coskun, B., Dietrich, S., Memon, N.: Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. In: Proc. of the 26 Annual Computer Security Applications Conference (ACSAC) (2010)","DOI":"10.1145\/1920261.1920283"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Coskun, B., Giura, P.: Mitigating SMS spam by online detection of repetitive near-duplicate messages. In: IEEE ICC 2012 Symposium on Communication and Information Systems Security (2012)","DOI":"10.1109\/ICC.2012.6363989"},{"key":"1_CR10","unstructured":"Gu, G., Perdisci, R., Zhang, J., Lee, W., et al.: Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. In: USENIX Security Symposium, pp. 139\u2013154 (2008)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Gy\u00f6ngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with trustrank. In: 13th International Conference on Very Large Data Bases, pp. 576\u2013587 (2004)","DOI":"10.1016\/B978-012088469-8.50052-8"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"He, Y., Zhong, Z., Krasser, S., Tang, Y.: Mining dns for malicious domain registrations. In: CollaborateCom, pp. 1\u20136. IEEE (2010)","DOI":"10.4108\/icst.collaboratecom.2010.5"},{"key":"1_CR13","unstructured":"Lever, C., Antonakakis, M., Reaves, B., Traynor, P., Lee., W.: The core of the matter: analyzing malicious traffic in cellular carriers. In: Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS) (2013)"},{"key":"1_CR14","unstructured":"Li, Z., Alrwais, S., Xie, Y., Yu, F., Wang, X.: Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures. In: 2013 IEEE Symposium on Security and Privacy, pp. 112\u2013126 (2013)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhang, K., Xie, Y., Yu, F., Wang, X.: Knowing your enemy: understanding and detecting malicious web advertising. In: 2012 ACM Conference on Computer and Communications Security, pp. 674\u2013686 (2012)","DOI":"10.1145\/2382196.2382267"},{"key":"1_CR16","unstructured":"Lookout: 2014 mobile threat report. \n                      http:\/\/goo.gl\/9aYO9B"},{"key":"1_CR17","unstructured":"Lookout: Security alert: Shoot the bulk messenger. \n                      https:\/\/blog.lookout.com\/blog\/2013\/12\/19\/shoot-the-bulk-messenger\/"},{"key":"1_CR18","unstructured":"Lookout: You are a winner! or are you? the walmart gift card scam. \n                      http:\/\/goo.gl\/WX6ps\n                      \n                    ."},{"key":"1_CR19","unstructured":"Lookout: U.S. targeted by coercive mobile ransomware impersonating the FBI, July 2014. \n                      https:\/\/blog.lookout.com\/blog\/2014\/07\/16\/scarepakage"},{"key":"1_CR20","unstructured":"McAfee: Mcafee labs threats report. \n                      http:\/\/mcafee.com\/us\/resources\/reports\/rp-quarterly-threat-q3-2014.pdf"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Murynets, I., Piqueras Jover, R.: Crime scene investigation: Sms spam data analysis. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, pp. 441\u2013452 (2012)","DOI":"10.1145\/2398776.2398822"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-41284-4_20","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"Y Nadji","year":"2013","unstructured":"Nadji, Y., Antonakakis, M., Perdisci, R., Lee, W.: Connected colors: unveiling the structure of criminal networks. In: Stolfo, S.J., Stavrou, A., Wright, C.V. (eds.) RAID 2013. LNCS, vol. 8145, pp. 390\u2013410. Springer, Heidelberg (2013)"},{"key":"1_CR23","unstructured":"Wikipedia: Whois. \n                      http:\/\/en.wikipedia.org\/wiki\/Whois"},{"issue":"3","key":"1_CR24","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/BF00344966","volume":"50","author":"H Wolda","year":"1981","unstructured":"Wolda, H.: Similarity indices, sample size and diversity. Oecologia 50(3), 296\u2013302 (1981)","journal-title":"Oecologia"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Yadav, S., Reddy, A.K.K., Reddy, A.N., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 48\u201361 (2010)","DOI":"10.1145\/1879141.1879148"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25645-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:58:53Z","timestamp":1559307533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25645-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319256443","9783319256450"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25645-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}