{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T17:52:25Z","timestamp":1725385945192},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/ccnc.2015.7157987","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T17:51:14Z","timestamp":1437069074000},"page":"262-266","source":"Crossref","is-referenced-by-count":2,"title":["Macroscopic view of malware in home networks"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Finamore","sequence":"first","affiliation":[]},{"given":"Sabyasachi","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Gaspar","family":"Modelo-Howard","sequence":"additional","affiliation":[]},{"given":"Sung-Ju","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Bocchi","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Grimaudo","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Baralis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"PhoneyC: A virtual client honeypot","author":"nazario","year":"2009","journal-title":"Proc of USENIX LEET"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1562764.1562777"},{"key":"ref12","article-title":"All Your iFRAMEs Point to Us","author":"provos","year":"2008","journal-title":"Proc of USENIX Security"},{"journal-title":"Conficker Still spamming after all these years","year":"2014","author":"seltzer","key":"ref13"},{"key":"ref14","article-title":"Highly predictive blacklisting","author":"zhang","year":"2008","journal-title":"Proc USENIX Security07"},{"journal-title":"Assessing the effectiveness of antivirus solutions","year":"2012","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382283"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22424-9_8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23269"},{"journal-title":"Antivirus is dead Long live antivirus!","year":"2014","author":"krebs","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.48"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.88"}],"event":{"name":"2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2015,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2015,1,12]]}},"container-title":["2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7151874\/7157933\/07157987.pdf?arnumber=7157987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T17:16:10Z","timestamp":1490375770000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7157987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2015.7157987","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}