{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:23:14Z","timestamp":1725427394103},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/iccitechnology.2013.6579517","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:36Z","timestamp":1377724296000},"page":"28-32","source":"Crossref","is-referenced-by-count":1,"title":["Botnet detection: A cooperative game theoretical correlation-based model"],"prefix":"10.1109","author":[{"given":"Noura","family":"Al Ebri","sequence":"first","affiliation":[]},{"given":"Hadi","family":"Otrok","sequence":"additional","affiliation":[]},{"given":"Azzam","family":"Mourad","sequence":"additional","affiliation":[]},{"given":"Yousof","family":"Al-Hammadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Botnets detection based on irc-community","author":"wei","year":"2008","journal-title":"Global Telecommunications Conference"},{"key":"17","first-page":"1319","article-title":"A survey of game theory using evolutionary algorithms. In information technology (itsim)","author":"sally","year":"2010","journal-title":"2010 IEEE International Symposium"},{"journal-title":"W32 Waledac Threat Analysis","year":"0","author":"tenebro","key":"18"},{"journal-title":"The Impact of Mobile Devices on Information Security A Survey of It Professional","year":"0","author":"research","key":"15"},{"key":"16","first-page":"1","article-title":"A survey of game theory as applied to network security. In system sciences (hicss)","author":"roy","year":"2010","journal-title":"2010 43rd Hawaii International Conference"},{"key":"13","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.comcom.2007.10.024","article-title":"A game-theoretic intrusion detection model for mobile ad-hoc networks","author":"otrok","year":"2008","journal-title":"Journal of Computer Communications"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.21"},{"key":"11","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/CCST.2007.4373496","article-title":"Trend of botnet activities","author":"ono","year":"2007","journal-title":"Security Technology 2007 41st Annual IEEE International Carnahan Conference"},{"key":"12","first-page":"48","article-title":"Game theoretic models for detecting network intrusions","author":"otrok","year":"2004","journal-title":"Computer Communications Journal"},{"key":"21","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/DSN.2010.5544306","article-title":"Detection of botnets using combined host and network level information","author":"zeng","year":"2010","journal-title":"Dependable Systems and Networks (DSN)"},{"journal-title":"Researcher Demos Sms-based Smartphone Botnet","year":"0","author":"danchev","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2010.5563555"},{"key":"2","article-title":"The zombie roundup: Understanding and detecting and disrupting botnets","author":"cooke","year":"2005","journal-title":"Proceedings of Workshop on Steps to Reducing Unwanted Traffic on the Internet SRUTI'05"},{"key":"1","first-page":"148","article-title":"An analysis of the asprox botnet. In emerging security information systems and technologies (securware)","author":"borgaonkar","year":"2010","journal-title":"2010 Fourth International Conference"},{"journal-title":"The Economics of Botnets","year":"0","author":"namestnikov","key":"10"},{"key":"7","article-title":"Botminer: Clustering analysis of network traffic for protocol and structure independent botnet detection","author":"gu","year":"2008","journal-title":"17th USENIX Security Symposium"},{"journal-title":"Distributed Attacks As Security Games","year":"2008","author":"fultz","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511528446"},{"journal-title":"The Botnet Business","year":"0","author":"kamluk","key":"9"},{"journal-title":"Android Malware Creates Smartphone Botnet Researchers Say","year":"0","author":"jeffrey","key":"8"}],"event":{"name":"2013 International Conference on Communications and Information Technology (ICCIT)","start":{"date-parts":[[2013,6,19]]},"location":"Beirut, Lebanon","end":{"date-parts":[[2013,6,21]]}},"container-title":["2013 Third International Conference on Communications and Information Technology (ICCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573243\/6579508\/06579517.pdf?arnumber=6579517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T13:22:19Z","timestamp":1563801739000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iccitechnology.2013.6579517","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}