{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:59:06Z","timestamp":1742403546404},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596053","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"185-194","source":"Crossref","is-referenced-by-count":23,"title":["Targeted attacks detection with SPuNge"],"prefix":"10.1109","author":[{"given":"Marco","family":"Balduzzi","sequence":"first","affiliation":[]},{"given":"Vincenzo","family":"Ciangaglini","sequence":"additional","affiliation":[]},{"given":"Robert","family":"McArdle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_11"},{"journal-title":"Anatomy of A Data Breach","year":"0","key":"15"},{"journal-title":"Industrial Espionage and Targeted Attacks Understanding the Characteristics of An Escalating Threat","year":"2012","author":"thonnard","key":"16"},{"key":"13","article-title":"X-means: Extending k-means with efficient estimation of the number of clusters","author":"pelleg","year":"2000","journal-title":"Proc Seventh Int Conf Machine Learning"},{"key":"14","article-title":"Behavioral clustering of httpbased malware and signature generation using malicious network traces","author":"perdisci","year":"2010","journal-title":"Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35416-8_16"},{"journal-title":"IXESHE Targeting East Asian Governments and Electronics Companies","year":"0","author":"micro","key":"12"},{"key":"3","article-title":"Scalable, behavior-based malware clustering","author":"bayer","year":"2009","journal-title":"the Symposium on Network and Distributed System Security NDSS-95"},{"key":"2","article-title":"From throw-away traffic to bots: Detecting the rise of dga-based malware","author":"antonakakis","year":"2012","journal-title":"Proceedings of the 21st USENIX Conference on Security Symposium"},{"year":"0","key":"1"},{"journal-title":"Clustering Disparate Attacks Mapping the Activities of the Advanced Persistent Threat","year":"0","author":"lee","key":"10"},{"journal-title":"Data Clustering A Review","year":"1999","author":"jain","key":"7"},{"journal-title":"Typo Squatting the Threat Network Defense Teams Overlook","year":"0","author":"hernandez","key":"6"},{"key":"5","article-title":"Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Proceedings of The 17th Conference on Security Symposium"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135853"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.52"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596053.pdf?arnumber=6596053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:34:56Z","timestamp":1490214896000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596053\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596053","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}