{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:30:00Z","timestamp":1747153800760,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/noms.2016.7502964","type":"proceedings-article","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T17:07:22Z","timestamp":1467652042000},"page":"1079-1084","source":"Crossref","is-referenced-by-count":8,"title":["How to choose from different botnet detection systems?"],"prefix":"10.1109","author":[{"given":"Fariba","family":"Haddadi","sequence":"first","affiliation":[]},{"given":"Duong-Tien","family":"Phan","sequence":"additional","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Introduction to Machine Learning","year":"2004","author":"alpaydin","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488056"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"801","DOI":"10.3233\/IDA-2011-0496","article-title":"Robust learning intrusion detection for dos attacks on wireless networks","volume":"15","author":"makanju","year":"2011","journal-title":"Intelligent Data Analysis"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768435"},{"journal-title":"TRANALYZER2","year":"0","key":"ref14"},{"journal-title":"Argus","year":"0","key":"ref15"},{"journal-title":"Wireless and secure networks research lab","year":"0","key":"ref16"},{"article-title":"Malware capture facility project, cvut university","year":"2013","author":"garcia","key":"ref17"},{"year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.36"},{"key":"ref4","article-title":"Bothunter: detecting malware infection through ids-driven dialog correlation","author":"gu","year":"2007","journal-title":"Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium"},{"journal-title":"SNORT","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_15"},{"article-title":"Malware capture facility project, cvut university-ctu-13 data set","year":"2011","author":"garcia","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.026"},{"key":"ref7","article-title":"Salting public traces with attack traffic to test flow classifiers","author":"celik","year":"2011","journal-title":"5th Cyber Security Experimentation Test (CSET)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2364743"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17533-1_9"},{"key":"ref9","article-title":"Peer-to-peer botnet detection based on flow intervals","author":"zhao","year":"2012","journal-title":"IFIP International Information Security and Privacy"}],"event":{"name":"NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2016,4,25]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2016,4,29]]}},"container-title":["NOMS 2016 - 2016 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7499631\/7502779\/07502964.pdf?arnumber=7502964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T13:42:00Z","timestamp":1568122920000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7502964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/noms.2016.7502964","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}