{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T21:26:46Z","timestamp":1768426006551,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642388644","type":"print"},{"value":"9783642388651","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38865-1_16","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T01:42:02Z","timestamp":1369618922000},"page":"146-156","source":"Crossref","is-referenced-by-count":11,"title":["Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic"],"prefix":"10.1007","author":[{"given":"Oksana","family":"Pomorova","sequence":"first","affiliation":[]},{"given":"Oleg","family":"Savenko","sequence":"additional","affiliation":[]},{"given":"Sergii","family":"Lysenko","sequence":"additional","affiliation":[]},{"given":"Andrii","family":"Kryshchuk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Buxbaum, P.: Battling Botnets. Military Information Technology (MIT)\u00a0vol. 12 (2008)"},{"key":"16_CR2","unstructured":"Zhaosheng, Z., Guohan, L., Yan, C., Fu, Z.J., Roberts, P., Keesook, H.: Botnet Research Survey. In: 32nd Annual IEEE International Computer Software and Applications, COMPSAC 2008, pp. 967\u2013972 (2008)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T.: Using Machine Learning Techniques to Identify Botnet Traffic. In: 31st IEEE Conference on Local Computer Networks, pp. 967\u2013974 (2006)","DOI":"10.1109\/LCN.2006.322210"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-0-387-68768-1","volume-title":"Botnet Detection. Countering the Largest Security Threat","author":"W. Lee","year":"2008","unstructured":"Lee, W., Wang, C., Dagon, D.: A Taxonomy of Botnet Structures. In: Botnet Detection. Countering the Largest Security Threat, pp. 143\u2013164. Springer, US (2008)"},{"key":"16_CR5","unstructured":"Stern, H.: A Survey of Modern Spam Tools. In: Proceedings of the Fifth Conference on Email and Anti-Spam (CEAS), Mountain View, CA (2008)"},{"key":"16_CR6","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-31217-5_19","volume-title":"Computer Networks","author":"O. Savenko","year":"2012","unstructured":"Savenko, O., Lysenko, S., Kryschuk, A.: Multi-agent Based Approach of Botnet Detection in Computer Systems. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol.\u00a0291, pp. 171\u2013180. Springer, Heidelberg (2012)"},{"key":"16_CR7","unstructured":"Florian, C.: The Most Vulnerable Operating Systems and Applications in 2011 (2012), \n                  \n                    http:\/\/www.gfi.com\/"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38865-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:12:12Z","timestamp":1557731532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38865-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388644","9783642388651"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38865-1_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}