{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T14:52:17Z","timestamp":1758120737167},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"U.S. Department of Defense through the Air Force","award":["FA8721-05-C-0002","10.13039\/100000005"],"award-info":[{"award-number":["FA8721-05-C-0002","10.13039\/100000005"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/tifs.2014.2334272","type":"journal-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T22:28:46Z","timestamp":1404253726000},"page":"1394-1405","source":"Crossref","is-referenced-by-count":23,"title":["Probabilistic Threat Propagation for Network Security"],"prefix":"10.1109","volume":"9","author":[{"given":"Kevin M.","family":"Carter","sequence":"first","affiliation":[]},{"given":"Nwokedi","family":"Idika","sequence":"additional","affiliation":[]},{"given":"William W.","family":"Streilein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553462"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920283"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811063"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"ref14","article-title":"Subgraph detection using eigenvector L1 norms","author":"miller","year":"2010","journal-title":"Proc 24th Neural Inf Process Syst (NIPS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.72.026132"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.76.036106"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1090\/conm\/001","author":"kindermann","year":"1980","journal-title":"Markov Random Fields and Their Applications"},{"key":"ref18","first-page":"282","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"Proc Int Conf Machine Learn (ICML)"},{"key":"ref19","author":"sutton","year":"2006","journal-title":"Introduction to Conditional Random Fields for Relational Learning"},{"key":"ref28","article-title":"A foray into Conficker&#x2019;s logic and rendezvous points","author":"porras","year":"2009","journal-title":"USENIX Conference on Large-Scale Exploits and Emergent Threats"},{"key":"ref4","article-title":"BotSniffer: Detecting botnet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"Proc 15th Annu Netw Distrib Syst Security Symp (NDSS)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638196"},{"key":"ref3","first-page":"139","article-title":"BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Proc 17th USENIX Security Symp"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879201"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2008.4690858"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298319"},{"key":"ref8","year":"2010","journal-title":"McAfee TrustedSource Web Database Reference Guide"},{"key":"ref7","year":"2012"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-540-87403-4_14","article-title":"On the limits of payload-oblivious network attack detection","author":"collins","year":"2008","journal-title":"Proc 3th Int Symp Recent Advances in Intrusion Detection (RAID)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1850795.1850796"},{"key":"ref1","first-page":"229","article-title":"SNORT&#x2014;Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 13th LISA Conf"},{"key":"ref20","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288321"},{"key":"ref21","author":"pearl","year":"1988","journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference"},{"key":"ref24","article-title":"EXPOSURE: Finding malicious domains using passive DNS analysis","author":"bilge","year":"2011","journal-title":"Proc 18th Annu Netw Distrib Syst Sec Symp (NDSS '11)"},{"key":"ref23","first-page":"273","article-title":"Building a dynamic reputation system for DNS","author":"antonakakis","year":"2010","journal-title":"Proc 19th USENIX Conf Security"},{"key":"ref26","year":"2004","journal-title":"SIEISC Security Information Exchange Internet Systems Consortium"},{"key":"ref25","first-page":"107","article-title":"Highly predictive blacklisting","author":"zhang","year":"2008","journal-title":"Proc 17th Conf Security Symp"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6867417\/06847231.pdf?arnumber=6847231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:31:05Z","timestamp":1642005065000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6847231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":30,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2334272","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9]]}}}