{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:28:16Z","timestamp":1730273296884,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/isdfs.2019.8757484","type":"proceedings-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T00:20:00Z","timestamp":1562890800000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Malware Hidden Behind Firewalls with Back Scans"],"prefix":"10.1109","author":[{"given":"Zhiqing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Esaki","sequence":"additional","affiliation":[]},{"given":"Hideya","family":"Ochiai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The internet motion sensor-a distributed blackhole monitoring system","author":"bailey","year":"2005","journal-title":"NDSS"},{"key":"ref11","article-title":"Nmap network scanning: The official Nmap project guide to network discovery and security scanning","author":"lyon","year":"2009","journal-title":"Insecure"},{"key":"ref12","first-page":"47","article-title":"Zmap: Fast internet-wide scanning and its security applications","volume":"8","author":"durumeric","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref13","first-page":"1092","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"USENIX Security Symposium"},{"journal-title":"Scapy documentation (!)","year":"2010","author":"biondi","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024940629314"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.10.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13861-4_26"},{"key":"ref6","volume":"1","author":"spitzner","year":"2003","journal-title":"Honeypots Tracking Hackers"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.11"},{"journal-title":"BotMiner Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection","year":"2008","author":"gu","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554896"},{"journal-title":"Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV) IoT Botnets","year":"2017","author":"angrishi","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.58"},{"key":"ref9","first-page":"4","article-title":"Honeyd-a virtual honeypot daemon","volume":"2","author":"provos","year":"2003","journal-title":"Proc 10th DFN-CERT Workshop"}],"event":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2019,6,10]]},"location":"Barcelos, Portugal","end":{"date-parts":[[2019,6,12]]}},"container-title":["2019 7th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8750993\/8757466\/08757484.pdf?arnumber=8757484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:20:59Z","timestamp":1658262059000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8757484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isdfs.2019.8757484","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}