{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T01:59:52Z","timestamp":1725760792633},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/icsmc.2010.5641914","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T16:35:53Z","timestamp":1291134953000},"page":"2564-2570","source":"Crossref","is-referenced-by-count":5,"title":["A discovery of sequential attack patterns of malware in botnets"],"prefix":"10.1109","author":[{"given":"Nur Rohman","family":"Rosyid","sequence":"first","affiliation":[]},{"given":"Masayuki","family":"Ohrui","sequence":"additional","affiliation":[]},{"given":"Hiroaki","family":"Kikuchi","sequence":"additional","affiliation":[]},{"given":"Pitikhate","family":"Sooraksa","sequence":"additional","affiliation":[]},{"given":"Masato","family":"Terada","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"448","article-title":"Application of PrefxSpan* Algorithm in Malware Detection Expert System","author":"lina","year":"2009","journal-title":"Education Technology and Computer Science (ETCS2009)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.012"},{"key":"ref6","first-page":"3","article-title":"Mining Sequential Patters: Generalizations and Performance Improvements","author":"srikant","year":"1996","journal-title":"Proc 5th Int Conf Extending Database Technology (EDBT)"},{"key":"ref5","first-page":"3","article-title":"Mining Sequential Patters","author":"agrawal","year":"1995","journal-title":"Data Engineering 1995 Proc of The 11th Int'l Conf on Data Engineering (ICDE95)"},{"journal-title":"A survey on sequence patter mining algorithms","year":"0","author":"pedro","key":"ref8"},{"key":"ref7","first-page":"215","article-title":"PrefxSpan: Mining Sequential Patterns by Prefix-Projected Growth","author":"pei","year":"2001","journal-title":"Proc of the 17th Int'l Conf on Data Engineering"},{"key":"ref2","first-page":"151","article-title":"Mining association rules consisting of download servers from distributed honeypot observation","author":"ohrui","year":"2009","journal-title":"IPSJ Malware Workshop (MWS2009)"},{"journal-title":"Threat Encyclopedia available from","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.68"}],"event":{"name":"2010 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2010,10,10]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2010,10,13]]}},"container-title":["2010 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629466\/5641665\/05641914.pdf?arnumber=5641914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T01:04:47Z","timestamp":1490058287000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5641914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2010.5641914","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}