{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:33:18Z","timestamp":1725892398206},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215117"},{"type":"electronic","value":"9783642215124"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21512-4_25","type":"book-chapter","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T03:35:54Z","timestamp":1306726554000},"page":"207-215","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of Malware Network Activity"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Berger-Sabbatel","sequence":"first","affiliation":[]},{"given":"Andrzej","family":"Duda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","first-page":"41","volume-title":"IMC 2006: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement","author":"M. Abu Rajab","year":"2006","unstructured":"Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: IMC 2006: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 41\u201352. ACM, New York (2006)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Alata, E., Alberdi, I., Nicomette, V., Owezarski, P., Kaaniche, M.: Internet attacks monitoring with dynamic connection redirection mechanisms. Journal on Internet Computer Virology\u00a07(2) (2008)","DOI":"10.1007\/s11416-007-0067-8"},{"key":"25_CR3","unstructured":"Anirudh Ramachandran, D.D., Feamster, N.: Revealing botnet membership using dnsbl counter-intelligence. In: U. Association, editor SRUTI 2006: 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, pp. 49\u201354 (2006)"},{"key":"25_CR4","unstructured":"Berger-Sabbatel, G., Korczy\u0144ski, M., Duda, A.: Architecture of a Platform for Malware Analysis and Confinement. In: Proc. MCSS 2010: Multimedia Communications, Services and Security, Cracow (2010)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Kumar, A., Paxson, V., Weaver, N.: Exploiting underlying structure for detailed reconstruction of an internet-scale event. In: PROC. ACM IMC (2005)","DOI":"10.1145\/1330107.1330150"},{"key":"25_CR6","unstructured":"Trinius, P., Willems, C., Holz, T., Rieck, K.: A malware instruction set for behavior-based analysis. Technical Report 2009-007, University of Mannheim (December 2009)"}],"container-title":["Communications in Computer and Information Science","Multimedia Communications, Services and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21512-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T22:08:41Z","timestamp":1553724521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21512-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215117","9783642215124"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21512-4_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}