{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:08:04Z","timestamp":1769915284092,"version":"3.49.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/asonam.2018.8508414","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T19:19:29Z","timestamp":1540495169000},"page":"1071-1078","source":"Crossref","is-referenced-by-count":12,"title":["iDetector: Automate Underground Forum Analysis Based on Heterogeneous Information Network"],"prefix":"10.1109","author":[{"given":"Yiming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yujie","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Shifu","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Thirimachos","family":"Bourlai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1290082.1290111"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.2200\/S00433ED1V01Y201207DMK005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_4"},{"key":"ref31","first-page":"33","article-title":"Measuring the longitudinal evolution of the online anonymous marketplace ecosystem","author":"soska","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2015.7165935"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.131"},{"key":"ref36","first-page":"2130","article-title":"Text classification with heterogeneous information network kernels","author":"wang","year":"2016","journal-title":"AAAI"},{"key":"ref35","article-title":"Framing dependencies introduced by underground commoditization","author":"thomas","year":"2015","journal-title":"WEIS"},{"key":"ref34","first-page":"992","article-title":"Pathsim: Meta path-based top-k similarity search in heterogeneous information networks","volume":"4","author":"sun","year":"2011","journal-title":"VLDB"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132857"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1058-9"},{"key":"ref11","first-page":"375","article-title":"An inquiry into the nature and causes of the wealth of internet miscreants","author":"franklin","year":"2007","journal-title":"CCS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807333"},{"key":"ref13","first-page":"507","article-title":"Laplacian score for feature selection","author":"he","year":"2006","journal-title":"NIPS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/0894439312452998"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/14786011003634415"},{"key":"ref16","first-page":"1486","article-title":"Pivot to internet plus: Molding chinas digital economy for economic restructuring?","volume":"11","author":"hong","year":"2017","journal-title":"International Journal of Communication"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1090\/psapm\/040\/1059485","article-title":"The hadamard product","volume":"40","author":"horn","year":"1990","journal-title":"Proc Symp Appl Math"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098026"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939815"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref4","author":"blagoeva","year":"0","journal-title":"Applying tam to study online shopping adoption among youth in the republic of macedonia"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.6.509"},{"key":"ref6","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"JMLR"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052600"},{"key":"ref5","first-page":"34","article-title":"Topic models","volume":"10","author":"blei","year":"2009","journal-title":"Text Mining Classification Clustering and Applications"},{"key":"ref8","year":"2014","journal-title":"Want to Rent An 80-120k DDoS Botnet"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134636"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/891237"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.01.002"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.7249\/RR610","author":"ablon","year":"2014","journal-title":"Markets for Cybercrime Tools and Stolen Data Hackers&#x2019; Bazaar"},{"key":"ref20","article-title":"Understanding the emerging threat of ddos-as-a-service","author":"karami","year":"2013","journal-title":"USENIX Workshop on Large-scale Exploits and Emergent Threats"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.48"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2012.07.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020448"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"ref41","first-page":"41","article-title":"A survey on malware detection using data mining techniques","volume":"50","author":"ye","year":"2017","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref23","first-page":"132","article-title":"Pexy: The other side of exploit kits","author":"maio","year":"2014","journal-title":"Proc Int'l Conf Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098063"},{"key":"ref26","author":"mikolov","year":"2013","journal-title":"Efficient Estimation of Word Representations in Vector Space"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.71"},{"key":"ref25","first-page":"775","article-title":"Corpus-based and knowledge-based measures of text semantic similarity","volume":"6","author":"mihalcea","year":"2006","journal-title":"AAAI"}],"event":{"name":"2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"Barcelona","start":{"date-parts":[[2018,8,28]]},"end":{"date-parts":[[2018,8,31]]}},"container-title":["2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488381\/8508239\/08508414.pdf?arnumber=8508414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:44:39Z","timestamp":1643211879000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8508414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/asonam.2018.8508414","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}