{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:15:05Z","timestamp":1771330505800,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/pst.2010.5593240","type":"proceedings-article","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T16:02:35Z","timestamp":1285948955000},"page":"31-38","source":"Crossref","is-referenced-by-count":116,"title":["On the analysis of the Zeus botnet crimeware toolkit"],"prefix":"10.1109","author":[{"given":"H.","family":"Binsalleeh","sequence":"first","affiliation":[]},{"given":"T.","family":"Ormerod","sequence":"additional","affiliation":[]},{"given":"A.","family":"Boukhtouta","sequence":"additional","affiliation":[]},{"given":"P.","family":"Sinha","sequence":"additional","affiliation":[]},{"given":"A.","family":"Youssef","sequence":"additional","affiliation":[]},{"given":"M.","family":"Debbabi","sequence":"additional","affiliation":[]},{"given":"L.","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0"},{"key":"ref11","year":"0","journal-title":"Banking malware zeus sucessfully bypasses anti-virus detection"},{"key":"ref12","year":"0","journal-title":"Zeus king of the underground crimeware toolkits"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-04444-1_1","article-title":"Learning more about the underground economy: A case-study of keyloggers and dropzones","author":"holz","year":"2009","journal-title":"Computer Security - ESORICS 2009"},{"key":"ref14","year":"0"},{"key":"ref15","year":"0"},{"key":"ref16","year":"0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_12"},{"key":"ref18","first-page":"3","article-title":"Cent, five cent, ten cent, dollar: hitting botnets where it really hurts","author":"ford","year":"2007","journal-title":"NSPW '06 Proceedings of the 2006 workshop on New security paradigms"},{"key":"ref4","article-title":"Blackenergy DDoS bot analysis","author":"nazario","year":"2007","journal-title":"ARBOR Networks Tech Rep"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159947"},{"key":"ref6","article-title":"The anatomy of clickbot. A","author":"daswani","year":"2007","journal-title":"HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets"},{"key":"ref5","article-title":"A case study of the rustock rootkit and spam bot","author":"chiang","year":"2007","journal-title":"HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets"},{"key":"ref8","first-page":"1","article-title":"Measurements and mitigation of Peer-to-Peer based botnets: a case study on storm worm","author":"holz","year":"2008","journal-title":"LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats"},{"key":"ref7","article-title":"Peer-to-Peer botnets: overview and case study","author":"grizzard","year":"2007","journal-title":"HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-44599-1_8"},{"key":"ref1","volume":"36","author":"wenke","year":"2008","journal-title":"Botnet Detection Countering the Largest Security Threat"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690856"}],"event":{"name":"2010 Eighth Annual International Conference on Privacy, Security and Trust (PST)","location":"Ottawa, Canada","start":{"date-parts":[[2010,8,17]]},"end":{"date-parts":[[2010,8,19]]}},"container-title":["2010 Eighth International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5564352\/5593224\/05593240.pdf?arnumber=5593240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T10:41:53Z","timestamp":1497868913000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5593240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/pst.2010.5593240","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}