{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T12:13:30Z","timestamp":1725711210832},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357947"},{"type":"electronic","value":"9783642357954"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35795-4_81","type":"book-chapter","created":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T04:49:42Z","timestamp":1357274982000},"page":"644-650","source":"Crossref","is-referenced-by-count":3,"title":["Control Method of Twitter- and SMS-Based Mobile Botnet"],"prefix":"10.1007","author":[{"given":"Yue","family":"Li","sequence":"first","affiliation":[]},{"given":"Lidong","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Zhilei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunlong","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"81_CR1","unstructured":"Wang, P., Sparks, S., Zou, C.: An Advanced Hybrid Peer-to-peer Botnet. In: Proc. USENIX HotBots 2007, p. 2 (2007)"},{"key":"81_CR2","volume-title":"Proc. of the 15th Annual Network and Distributed System Security Symposium","author":"T. Holz","year":"2008","unstructured":"Holz, T., Gorecki, C., Rieck, C., et al.: Detection and mitigation of fast-flux service networks. In: Proc. of the 15th Annual Network and Distributed System Security Symposium. USENIX, Berkeley (2008)"},{"key":"81_CR3","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1145\/1653662.1653738","volume-title":"Proc. of the 16th ACM Conf on Computer and Communications Security","author":"B. Stone-Gross","year":"2009","unstructured":"Stone-Gross, B., Cova, M., Cavallaro, L., et al.: Your botnet is my botnet; Analysis of a botnet takeover. In: Proc. of the 16th ACM Conf on Computer and Communications Security, pp. 635\u2013647. ACM, New York (2009)"},{"key":"81_CR4","volume-title":"Proc. of the 4th Usenix Workshop on Large-scale Exploits and Emergent Threats","author":"X. Cui","year":"2011","unstructured":"Cui, X., Fang, B., Yin, L., et al.: Andbot: Towards advanced mobile botnets. In: Proc. of the 4th Usenix Workshop on Large-scale Exploits and Emergent Threats. USENIX, Berkeley (2011)"},{"issue":"1","key":"81_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.2005.26","volume":"38","author":"D. Geer","year":"2005","unstructured":"Geer, D.: Malicious bots threaten network security. Computer\u00a038(1), 18\u201320 (2005)","journal-title":"Computer"},{"key":"81_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-29426-6_10","volume-title":"Web Technologies and Applications","author":"W. Guo","year":"2012","unstructured":"Guo, W., Zhai, L., Guo, L., Shi, J.: Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network. In: Wang, H., Zou, L., Huang, G., He, J., Pang, C., Zhang, H.L., Zhao, D., Yi, Z. (eds.) APWeb 2012 Workshops. LNCS, vol.\u00a07234, pp. 68\u201377. Springer, Heidelberg (2012)"},{"issue":"12","key":"81_CR7","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MC.2007.440","volume":"40","author":"J. Brown","year":"2007","unstructured":"Brown, J., Shipman, B., Vetter, R.: SMS: The Short Message Service. Computer\u00a040(12), 106\u2013110 (2007)","journal-title":"Computer"},{"key":"81_CR8","doi-asserted-by":"crossref","unstructured":"Boyd, D., Golder, S., Lotan, G.: Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter. In: Proc. of 43rd Hawaii International Conference on System Sciences(HICSS), pp. 1\u201310 (2011)","DOI":"10.1109\/HICSS.2010.412"},{"key":"81_CR9","doi-asserted-by":"crossref","unstructured":"Perera, R.D.W.: Twitter Analytics: Architecture, Tools and Analysis. In: Proc. of Conference on Military Communications, pp. 2186\u20132191 (2010)","DOI":"10.1109\/MILCOM.2010.5680493"}],"container-title":["Communications in Computer and Information Science","Trustworthy Computing and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35795-4_81.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T09:31:27Z","timestamp":1620120687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35795-4_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642357947","9783642357954"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35795-4_81","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}