{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:47:49Z","timestamp":1749793669354,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T00:00:00Z","timestamp":1641168000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,1,3]]},"DOI":"10.1109\/imcom53663.2022.9721811","type":"proceedings-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T21:56:54Z","timestamp":1646085414000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Machine Learning for Multi-Classification of Botnets Attacks"],"prefix":"10.1109","author":[{"given":"Thanh Cong","family":"Tran","sequence":"first","affiliation":[{"name":"Ho Chi Minh University of Economics and Finance (UEF),Ho Chi Minh City,Vietnam"}]},{"given":"Tran","family":"Khanh Dang","sequence":"additional","affiliation":[{"name":"Ho Chi Minh City University of Food Industry,Ho Chi Minh City,Vietnam"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACOMP50827.2020.00010"},{"year":"0","key":"ref31","article-title":"Scilkit-learn"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IMCOM51814.2021.9377352"},{"key":"ref10","article-title":"Bots and Botnet: An Overview","author":"puri","year":"2003","journal-title":"SANS Int"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/fi10050043"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.640"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.350"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/app9112375"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050111"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034156"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/app10197009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10040519"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-801559-9.00010-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app112110004"},{"key":"ref3","first-page":"2013","article-title":"Embracing the Internet of Everything to Capture Your Share of $ 14.4 Trillion","author":"bradley","year":"2013","journal-title":"Cisco Ibsg Gr"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9050800"},{"key":"ref29","first-page":"1","article-title":"Metrics for Multi-Class Classification: an Overview","author":"grandini","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101399"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00254-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PDP2018.2018.00077"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of Things: Vision, Applications and Research Challenges","volume":"10","author":"miorandi","year":"2012","journal-title":"Ad Hoc Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref21","first-page":"1","article-title":"A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network","author":"roy","year":"2019","journal-title":"2018 28th Int Telecommun Networks Appl Conf ITNAC 2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538636"},{"key":"ref23","first-page":"1093","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"Usenix Security"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-823377-1.50274-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-817736-5.00009-0"}],"event":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","start":{"date-parts":[[2022,1,3]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,1,5]]}},"container-title":["2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9721625\/9721626\/09721811.pdf?arnumber=9721811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:10:44Z","timestamp":1655759444000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9721811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,3]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/imcom53663.2022.9721811","relation":{},"subject":[],"published":{"date-parts":[[2022,1,3]]}}}