{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T17:26:24Z","timestamp":1744910784407},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999411","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"93-100","source":"Crossref","is-referenced-by-count":7,"title":["Fighting banking botnets by exploiting inherent command and control vulnerabilities"],"prefix":"10.1109","author":[{"given":"Lanier","family":"Watkins","sequence":"first","affiliation":[]},{"given":"Christina","family":"Kawka","sequence":"additional","affiliation":[]},{"given":"Cherita","family":"Corbett","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"22","article-title":"Fast dictionary attacks on passwords using time-space tradeoff","author":"narayanan","year":"2005","journal-title":"ACM Conference on Computer and Communications Security"},{"year":"0","key":"17"},{"journal-title":"Brute Force Attacks Beyond Password Basics","year":"0","author":"menegaz","key":"23"},{"journal-title":"Cyber-vigilantes Hunt Down Hackers","year":"1999","author":"schwartau","key":"18"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"15","article-title":"Should the U.S. Allow companies to 'hack back' against foreign cyber spies?","author":"fisher","year":"2013","journal-title":"The Washington Post Online"},{"year":"0","key":"16","first-page":"81"},{"journal-title":"Zeus User Guide","year":"0","key":"13"},{"journal-title":"Top Ten ZeuS Hosting Countries (With Files Online)","year":"0","key":"14"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076736"},{"year":"0","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.023"},{"year":"0","key":"20"},{"journal-title":"Dell SecureWorks Counter Threat Unit(TM) Threat Intelligence","year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"journal-title":"Fuzzing for Software Security Testing and Quality Assurance","year":"2008","author":"takanen","key":"10"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime.2011.6151981"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"journal-title":"Finally Source Code of ZeuS Botnet Version 2 0 8 9 Available for Download!","year":"0","author":"kumar","key":"4"},{"key":"9","article-title":"Mirage Anti-Bot 2.0: Protection against ZeuS, SpyEye Malwares","author":"kumar","year":"2012","journal-title":"The Hacker News Website"},{"key":"8","article-title":"How to protect yourself against Gameover Zeus and other botnets","author":"bradley","year":"2014","journal-title":"PCWorld Online Magazine"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","start":{"date-parts":[[2014,10,28]]},"location":"Fajardo, PR, USA","end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999411.pdf?arnumber=6999411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T21:13:46Z","timestamp":1490303626000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999411","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}