{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:57:28Z","timestamp":1730231848378,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6364598","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T05:17:44Z","timestamp":1354598264000},"page":"971-975","source":"Crossref","is-referenced-by-count":3,"title":["Revealing and analysing modem malware"],"prefix":"10.1109","author":[{"given":"Pavel","family":"Celeda","sequence":"first","affiliation":[]},{"given":"Radek","family":"Krejci","sequence":"additional","affiliation":[]},{"given":"Vojtech","family":"Krmicek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Recommendations for the remediation of bots in ISP networks","author":"livingood","year":"2011","journal-title":"Internet-draft"},{"key":"16","article-title":"Comcast's web notification system design","author":"chung","year":"2011","journal-title":"RFC 6108"},{"journal-title":"SQUASHFS - A Squashed Read-only Filesystem for Linux","year":"2011","author":"lougher","key":"13"},{"key":"14","article-title":"Cisco systems netflow services export version 9","author":"claise","year":"2004","journal-title":"RFC 3954"},{"journal-title":"Hydra - Mass DDoS Tool","year":"2008","key":"11"},{"journal-title":"Kaiten c Irc Ddos Bot","year":"2001","key":"12"},{"journal-title":"Router Hacking Challenge","year":"2008","key":"3"},{"journal-title":"Busybox The Swiss Army Knife of Embedded Linux","year":"2011","author":"andersen","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"journal-title":"UPX The Ultimate Packer for eXecutables","year":"2011","author":"oberhumer","key":"10"},{"key":"7","first-page":"3","article-title":"Embedded malware - An analysis of the chuck norris botnet","volume":"2010","author":"c?eleda","year":"0","journal-title":"Proceedings of the 2010 European Conference on Computer Network"},{"journal-title":"Random Attempts to Hit Port 23 (Telnet)","year":"2009","key":"6"},{"journal-title":"Network Bluepill - Stealth Router-based Botnet has been Ddosing Dronebl for the Last Couple of Weeks","year":"2011","key":"5"},{"journal-title":"Psyb0t Information Page","year":"2009","author":"baume","key":"4"},{"key":"9","article-title":"An analysis of the chuck norris botnet 2","author":"c?eleda","year":"2011","journal-title":"Institute of Computer Science Masaryk University Brno Tech Rep"},{"journal-title":"Full Disclosure Mailing List Archives - Ssh Scans i Caught One","year":"2010","author":"berkum","key":"8"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06364598.pdf?arnumber=6364598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:07:44Z","timestamp":1490130464000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6364598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc.2012.6364598","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}