{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T11:53:55Z","timestamp":1723550035145},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999414","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"source":"Crossref","is-referenced-by-count":11,"title":["PsyBoG: Power spectral density analysis for detecting botnet groups"],"prefix":"10.1109","author":[{"given":"Jonghoon","family":"Kwon","sequence":"first","affiliation":[]},{"given":"Jeongsik","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jehyun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Heejo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"95","article-title":"Botgrep: Finding p2p bots with structured graph analysis","author":"nagaraja","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"17","year":"2013","journal-title":"DNS-BH Malware Domain Block List"},{"key":"18","year":"2014","journal-title":"McAfee Thread Reports"},{"key":"15","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/978-3-642-21031-0_26","article-title":"Hidden bot detection by tracing non-human generated traffic at the zombie host","author":"kwon","year":"2011","journal-title":"Proc of Int'l Conf on Information Security Practice and Experience"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85886-7_7"},{"key":"13","article-title":"Jackstraws: Picking command and control connections from bot traffic","author":"jacob","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1086\/168277"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1029\/1999JA900026"},{"key":"12","article-title":"Introduction to mathematical statistics","author":"hoel","year":"1954","journal-title":"Introduction to Mathematical Statistics"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1117\/12.790111"},{"key":"20","article-title":"An analysis of confickers logic and rendezvous points","author":"porras","year":"2009","journal-title":"Computer Science Laboratory"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774506"},{"key":"23","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-540-73614-1_6","article-title":"Characterizing bots remote control behavior","author":"stinson","year":"2007","journal-title":"Proc of the 4th Int'l Conf on Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413217"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.40"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426172"},{"key":"2","author":"antonakakis","year":"2012","journal-title":"Dgas and Cyber-criminals A Case Study"},{"key":"10","article-title":"Botsniffer: Detecting botnet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"NDSS"},{"key":"1","year":"2014","journal-title":"Alexa Top 500 Sites on the Web"},{"key":"7","first-page":"8","article-title":"Rishi: Identify bot contaminated hosts by irc nickname evaluation","author":"goebel","year":"2007","journal-title":"Proc of the First Conf on Hot Topics in Understanding Botnets"},{"key":"6","article-title":"Cocospot: Clustering and recognizing botnet command and control channels using traffic analysis","author":"dietrich","year":"2012","journal-title":"Computer Networks"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1621890.1621893"},{"key":"4","article-title":"Exposure: Finding malicious domains using passive dns analysis","author":"bilge","year":"2011","journal-title":"NDSS"},{"key":"9","first-page":"1","article-title":"Bothunter: Detecting malware infection through ids-driven dialog correlation","author":"gu","year":"2007","journal-title":"USENIX Security Symposium"},{"key":"8","first-page":"139","article-title":"Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2014,10,28]]},"end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999414.pdf?arnumber=6999414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T17:41:24Z","timestamp":1566236484000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999414","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}