{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:39:08Z","timestamp":1729672748754,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/ssic.2016.7571810","type":"proceedings-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T17:19:12Z","timestamp":1474564752000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Clustering methods comparison: Application to source based detection of botclouds"],"prefix":"10.1109","author":[{"given":"Badis","family":"Hammi","sequence":"first","affiliation":[]},{"given":"Mohamed Cherif","family":"Rahal","sequence":"additional","affiliation":[]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Rfc 3013, recommended internet service provider security services and procedures","author":"killalea","year":"2000","journal-title":"Internet Engineering Task Force (IETF)"},{"key":"ref11","first-page":"203","article-title":"Applications and Techniques in Information Security: 6th International Conference, ATIS 2015, Beijing, China, November 4&#x2013;6, 2015, Proceedings","author":"li","year":"2015","journal-title":"chapter You Can't Hide A Novel Methodology to Defend DDoS Attack Based on Botcloud"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.484"},{"key":"ref13","article-title":"Arbor Networks","volume":"ix","year":"2014","journal-title":"WorldWide Infrastructure Security Report"},{"journal-title":"Botcloud An Emerging Platform for Cyber-attacks","year":"2012","author":"pedram","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"key":"ref16","volume":"1","author":"tan","year":"2006","journal-title":"Introduction to Data Mining"},{"key":"ref17","first-page":"207","author":"tulasiram","year":"2013","journal-title":"An extrusion detection system against botclouds"},{"key":"ref18","first-page":"585","article-title":"Handbook of Natural Computing","author":"van hulle","year":"2012","journal-title":"chapter Self-organizing Maps"},{"key":"ref4","first-page":"597","article-title":"Botclouds - the future of cloud-based botnets","author":"clark","year":"2011","journal-title":"Proceedings of the 1st International Conference on Cloud Computing and Services Science (CLOSER 2011)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336986"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2194508"},{"key":"ref5","first-page":"15","article-title":"Hackers take down the most wired country in europe","volume":"15","author":"davis","year":"2007","journal-title":"Wired Magazine"},{"journal-title":"Clustering by Means of Medoids","article-title":"Leonard Kaufman and Peter Rousseeuw","year":"1987","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140406"},{"journal-title":"Akamai&#x2019; s state of the internet\/security","year":"2014","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2014.6913971"}],"event":{"name":"2016 International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC)","start":{"date-parts":[[2016,7,18]]},"location":"Paris, France","end":{"date-parts":[[2016,7,19]]}},"container-title":["2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7565236\/7571793\/07571810.pdf?arnumber=7571810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:52:37Z","timestamp":1476226357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7571810\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ssic.2016.7571810","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}