{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:48:55Z","timestamp":1758707335492},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_8","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"110-121","source":"Crossref","is-referenced-by-count":10,"title":["A Host-Based Detection Method of Remote Access Trojan in the Early Stage"],"prefix":"10.1007","author":[{"given":"Daichi","family":"Adachi","sequence":"first","affiliation":[]},{"given":"Kazumasa","family":"Omote","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Chandran, S., Hrudya, P., Poornachandran, P.: An efficient classification model for detecting advanced persistent threat. In: The International Conference on Advances in Computing, Communications and Informations (ICACCI 2015), pp. 2001\u20132009 (2015)","key":"8_CR1","DOI":"10.1109\/ICACCI.2015.7275911"},{"issue":"2","key":"8_CR2","first-page":"2266","volume":"6","author":"N Das","year":"2014","unstructured":"Das, N., Sarkar, T.: Survey on host and network based intrusion detection system. Int. J. Adv. Netw. Appl. 6(2), 2266\u20132269 (2014)","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"8_CR3","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.cose.2014.09.006","volume":"48","author":"I Friedberg","year":"2015","unstructured":"Friedberg, I., Skopik, F., Settanni, G., Fiedler, R.: Combating advanced persistent threats: from network event correlation to incident detection. Comput. Secur. 48, 35\u201357 (2015)","journal-title":"Comput. Secur."},{"unstructured":"Information-Technology Promotion Agency, Japan, \u201c10 Major Security Threats 2015\u201d (2015)","key":"8_CR4"},{"issue":"1","key":"8_CR5","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1587\/transfun.E99.A.145","volume":"E99\u2013A","author":"D Jiang","year":"2016","unstructured":"Jiang, D., Omote, K.: A RAT detection method based on network behaviors of the communication\u2019s early stage. IEICE Trans. Fundam. E99\u2013A(1), 145\u2013153 (2016)","journal-title":"IEICE Trans. Fundam."},{"doi-asserted-by":"crossref","unstructured":"Li, S., Yun, X., Zhang, Y., Xiao, J., Wang, Y.: A general framework of Trojan communication detection based on network traces. In: The 7th International Conference on Networking, Architecture and Storage (NAS 2012), pp. 49\u201358 (2012)","key":"8_CR6","DOI":"10.1109\/NAS.2012.10"},{"issue":"7","key":"8_CR7","doi-asserted-by":"crossref","first-page":"2520","DOI":"10.1007\/s11227-015-1506-9","volume":"72","author":"D Moon","year":"2015","unstructured":"Moon, D., Pan, S.B., Kim, I.: Host-based intrusion detection system for secure human-centric computing. J. Supercomput. 72(7), 2520\u20132536 (2015)","journal-title":"J. Supercomput."},{"unstructured":"Mimura, S., Sasaki, R.: Method for estimating unjust communication cause using network packets associated with process information. In: The International Conference on Information Security and Cyber Forensics (InfoSec 2014) (2014)","key":"8_CR8"},{"issue":"5","key":"8_CR9","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s11859-013-0944-6","volume":"18","author":"Y Liang","year":"2013","unstructured":"Liang, Y., Peng, G., Zhang, H., Wang, Y.: An unknown Trojan detection method based on software network behavior. Wuhan Univ. J. Nat. Sci. 18(5), 369\u2013376 (2013)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"unstructured":"Yamauchi, K., Kawamoto, J., Hori, Y., Sakurai, K.: Extracting C&C traffic by session classification using machine learning. In: The 7th Workshop Among Asian Information Security Labs (WAIS) (2014)","key":"8_CR10"},{"doi-asserted-by":"crossref","unstructured":"Yamada, M., Morinaga, M., Unno, Y., Torii, S., Takenaka, M.: RAT-based malicious activities detection on enterprise internal networks. In: The 10th International Conference for Internet Technology and Secured Transactions (ICITST 2015), pp. 321\u2013325 (2015)","key":"8_CR11","DOI":"10.1109\/ICITST.2015.7412113"},{"doi-asserted-by":"crossref","unstructured":"Zeng, Y., Hu, X., Shin, K.G.: Detection of botnets using combined host- and network-level information. In: IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2010), pp. 291\u2013300 (2010)","key":"8_CR12","DOI":"10.1109\/DSN.2010.5544306"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T02:46:23Z","timestamp":1498358783000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}