{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:05:34Z","timestamp":1748750734106,"version":"3.41.0"},"publisher-location":"New Delhi","reference-count":16,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_2","type":"book-chapter","created":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:41:10Z","timestamp":1445733670000},"page":"13-21","source":"Crossref","is-referenced-by-count":7,"title":["Equitable Machine Learning Algorithms to Probe Over P2P Botnets"],"prefix":"10.1007","author":[{"given":"Pavani","family":"Bharathula","sequence":"first","affiliation":[]},{"given":"N.","family":"Mridula Menon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Barthakur, P., Dahal, M., Ghose, M.K.: An efficient machine learning based classification scheme for detecting distributed command & control traffic of P2P botnets. p. 9 (2013)","key":"2_CR1","DOI":"10.5815\/ijmecs.2013.10.02"},{"unstructured":"Biau, G.: Analysis of a random forests model. JMLR. org, 1063\u20131095 (2012)","key":"2_CR2"},{"doi-asserted-by":"crossref","unstructured":"Gandotra, E., Bansal, D., Sofat, S.: Malware Analysis and Classification: A survey. Scientific Research Publishing (2014)","key":"2_CR3","DOI":"10.4236\/jis.2014.52006"},{"doi-asserted-by":"crossref","unstructured":"Haddadi, F., Morgan, J., et al.: Botnet behaviour analysis using ip flows: with http filters using classifiers. In: 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 7\u201312 (2014)","key":"2_CR4","DOI":"10.1109\/WAINA.2014.19"},{"doi-asserted-by":"crossref","unstructured":"Li, L., Mathur, S., Coskun, B.: Gangs of the internet: towards automatic discovery of peer-to-peer communities. In: IEEE Conference on Communications and Network Security (CNS), pp. 64\u201372 (2013)","key":"2_CR5","DOI":"10.1109\/CNS.2013.6682693"},{"doi-asserted-by":"crossref","unstructured":"Lu, C., Brooks, R.: Botnet traffic detection using hidden markov models. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, p. 31 (2011)","key":"2_CR6","DOI":"10.1145\/2179298.2179332"},{"doi-asserted-by":"crossref","unstructured":"Per\u00e9nyi, M., Dang, T.D., Gefferth, A., Moln\u00e1r, S.: Identification and analysis of peer-to-peer traffic, pp. 36\u201346 (2006)","key":"2_CR7","DOI":"10.4304\/jcm.1.7.36-46"},{"doi-asserted-by":"crossref","unstructured":"Rahbarinia, B., Perdisci, R., Lanzi, A., Li, K.: Peerrush: Mining for unwanted P2P traffic, pp. 194\u2013208, Elsevier (2014)","key":"2_CR8","DOI":"10.1016\/j.jisa.2014.03.002"},{"unstructured":"Sebastian Garcia, V.U.: Malware capture facility project. http:\/\/mcfp.weebly.com\/","key":"2_CR9"},{"doi-asserted-by":"crossref","unstructured":"Singh, K., Agrawal, S.: Comparative analysis of five machine learning algorithms for IP traffic classification. In: International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), pp. 33\u201338 (2011)","key":"2_CR10","DOI":"10.1109\/ETNCC.2011.5958481"},{"unstructured":"Stevanovic, M., Pedersen, J.M.: Machine learning for identifying botnet network traffic (2013)","key":"2_CR11"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-68768-1_1","volume-title":"Botnet Detection","author":"WT Strayer","year":"2008","unstructured":"Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behavior. Botnet Detection, pp. 1\u201324. Springer, New York (2008)"},{"unstructured":"Vania, J., Meniya, A., Jethva, H.: A review on botnet and detection technique, pp. 23\u201329 (2013)","key":"2_CR13"},{"unstructured":"Victoria, U.: Isot research lab datasets. http:\/\/www.uvic.ca\/engineering\/ece\/isot\/datasets\/","key":"2_CR14"},{"issue":"1","key":"2_CR15","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/TIFS.2013.2290197","volume":"9","author":"Junjie Zhang","year":"2014","unstructured":"Zhang, J., Perdisci, R., Lee, W., Luo, X., Sarfraz, U.: Building a scalable system for stealthy P2P-botnet detection. IEEE, pp. 27\u201338 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"crossref","unstructured":"Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Elsevier, pp. 2\u201316 (2013)","key":"2_CR16","DOI":"10.1016\/j.cose.2013.04.007"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T03:55:45Z","timestamp":1748663745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}