{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:28Z","timestamp":1766449708741,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838310","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T15:03:46Z","timestamp":1406559826000},"page":"1-9","source":"Crossref","is-referenced-by-count":16,"title":["Understanding botclouds from a system perspective: A principal component analysis"],"prefix":"10.1109","author":[{"given":"Hammi","family":"Badis","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Doyen","sequence":"additional","affiliation":[]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"18","article-title":"A survey of intrusion detection techniques in cloud","author":"modi","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"key":"15","first-page":"161","article-title":"Analyzing large ddos attacks using multiple data sources","author":"morley mao","year":"2006","journal-title":"Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense LSAD'06"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.35"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.01.006"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7298r1","author":"kissel","year":"2011","journal-title":"Glossary of Key Information Security Terms"},{"key":"11","first-page":"28","article-title":"Botnets as a vehicle for online crime","volume":"1","author":"ianelli","year":"2005","journal-title":"CERT Coordination Center"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.103"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"journal-title":"Botcloud An Emerging Platform for Cyber-attacks","year":"2012","author":"pedram","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-0641-5_17"},{"journal-title":"A Novel Anomaly Detection Scheme Based on Principal Component Classifier","year":"2003","author":"shyu","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1167253.1167288"},{"journal-title":"Botnet Lab Creation with Open Source Tools and Usefulness of Such A Tool for Researchers","year":"2011","author":"vergos","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7439(87)80084-9"},{"key":"27","first-page":"696","article-title":"An adaptive network intrusion detection method based on pca and support vector machines","author":"xu","year":"2005","journal-title":"Advanced Data Mining and Applications Volume 3584 of Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.171"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.40"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967989"},{"key":"7","first-page":"597","article-title":"Botclouds - The future of cloud-based botnets?","author":"clark","year":"2011","journal-title":"Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER 2011)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655020"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.2005.59"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371572"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838310.pdf?arnumber=6838310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T04:11:07Z","timestamp":1565669467000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838310","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}