{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T17:55:21Z","timestamp":1687542921412},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,2,3]],"date-time":"2018-02-03T00:00:00Z","timestamp":1517616000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-018-5384-3","type":"journal-article","created":{"date-parts":[[2018,2,3]],"date-time":"2018-02-03T07:21:00Z","timestamp":1517642460000},"page":"3465-3476","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Multi Attribute Real Time Traffic Inference Algorithm for Botnet Detection in Mobile Ad Hoc Network"],"prefix":"10.1007","volume":"102","author":[{"given":"G.","family":"Kavitha","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,3]]},"reference":[{"key":"5384_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-06320-1_7","volume":"8434","author":"Y Ji","year":"2014","unstructured":"Ji, Y., He, Y., Zhu, D., Li, Q., & Guo, D. (2014). A multiprocess mechanism of evading behavior-based bot detection approaches. Information Security Practice and Experience, 8434, 75\u201389.","journal-title":"Information Security Practice and Experience"},{"issue":"11","key":"5384_CR2","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1631\/jzus.C1300242","volume":"15","author":"A Karim","year":"2014","unstructured":"Karim, A., Salleh, R. B., Shiraz, M., Shah, S. A. A., Awan, I., & Anuar, N. B. (2014). Botnet detection techniques: review, future trends, and issues. Journal of Zhejiang University Science, 15(11), 943\u2013983.","journal-title":"Journal of Zhejiang University Science"},{"key":"5384_CR3","first-page":"439","volume":"8713","author":"S Nagaraja","year":"2014","unstructured":"Nagaraja, S. (2014). Botyacc: Unified P2P botnet detection using behavioural analysis and graph analysis. Computer Security\u2014ESORICS 2014 Lecture Notes in Computer Science, 8713, 439\u2013456.","journal-title":"Computer Security\u2014ESORICS 2014 Lecture Notes in Computer Science"},{"key":"5384_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-319-17533-1_9","volume":"9065","author":"F Haddadi","year":"2015","unstructured":"Haddadi, F., Le Cong, D., Porter, L., & Zincir-Heywood, A. N. (2015). On the effectiveness of different botnet detection approaches. Information Security Practice and Experience Lecture Notes in Computer Science, 9065, 121\u2013135.","journal-title":"Information Security Practice and Experience Lecture Notes in Computer Science"},{"key":"5384_CR5","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-319-07941-7_27","volume":"431","author":"O Pomorova","year":"2014","unstructured":"Pomorova, O., Savenko, O., Lysenko, S., Kryshchuk, A., & Nicheporuk, A. (2014). A technique for detection of bots which are using polymorphic code. Computer Networks Communications in Computer and Information Science, 431, 265\u2013276.","journal-title":"Computer Networks Communications in Computer and Information Science"},{"key":"5384_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1186\/s13635-014-0015-3","volume":"2014","author":"P Narang","year":"2014","unstructured":"Narang, P., Hota, C., & Venkatakrishnan, V. N. (2014). PeerShark: Flow-clustering and conversation-generation for malicious peer-to-peer traffic identification. EURASIP Journal on Information security, 2014, 15.","journal-title":"EURASIP Journal on Information security"},{"key":"5384_CR7","first-page":"334","volume":"420","author":"S Garg","year":"2014","unstructured":"Garg, S., Sarje, A. K., & Peddoju, S. K. (2014). Improved detection of P2P botnets through network behavior analysis. Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science, 420, 334\u2013345.","journal-title":"Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science"},{"key":"5384_CR8","first-page":"192","volume":"8550","author":"S Schiavoni","year":"2014","unstructured":"Schiavoni, S., Maggi, F., Cavallaro, L., & Zanero, S. (2014). Phoenix: DGA-based botnet tracking and intelligence. Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science, 8550, 192\u2013211.","journal-title":"Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science"},{"issue":"5","key":"5384_CR9","doi-asserted-by":"publisher","first-page":"12","DOI":"10.5120\/15876-4823","volume":"91","author":"K Chanda","year":"2014","unstructured":"Chanda, K. (2014). Hybrid botnet detection mechanism. International Journal of Computer Applications, 91(5), 12\u201316.","journal-title":"International Journal of Computer Applications"},{"issue":"3","key":"5384_CR10","first-page":"36","volume":"7","author":"HR Zeidanloo","year":"2010","unstructured":"Zeidanloo, H. R., & Manaf, A. B. A. (2010). Botnet detection by monitoring similar communication patterns (IJCSIS). International Journal of Computer Science and Information Security, 7(3), 36\u201345.","journal-title":"International Journal of Computer Science and Information Security"},{"issue":"6","key":"5384_CR11","first-page":"34","volume":"2","author":"AK Tyagi","year":"2012","unstructured":"Tyagi, A. K., & Nayeem, S. (2012). Detecting HTTP botnet using artificial immune system (AIS). International Journal of Applied Information Systems, 2(6), 34\u201337.","journal-title":"International Journal of Applied Information Systems"},{"key":"5384_CR12","doi-asserted-by":"crossref","unstructured":"Zeidanloo, H. R., Manaf, A. B. T.,  Vahdani, P., Tabatabaei, F., &  Zamani, M. (2010). Botnet detection based on traffic monitoring. In International Conference on Networking and Information Technology (pp. 97\u2013101). IEEE.","DOI":"10.1109\/ICNIT.2010.5508552"},{"issue":"2","key":"5384_CR13","first-page":"161","volume":"2","author":"HR Zeidanloo","year":"2010","unstructured":"Zeidanloo, H. R., & Abdul Manaf, A. B. T. (2010). A proposed framework for P2P Botnet detection. IACSIT International Journal of Engineering and Technology, 2(2),\u00a0161\u2013168.","journal-title":"IACSIT International Journal of Engineering and Technology"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5384-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5384-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5384-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T01:11:16Z","timestamp":1549156276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5384-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,3]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5384"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5384-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,3]]},"assertion":[{"value":"3 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}