{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:29Z","timestamp":1761402029639,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001821","name":"Vienna Science and Technology Fund","doi-asserted-by":"publisher","award":["ICT15-129"],"award-info":[{"award-number":["ICT15-129"]}],"id":[{"id":"10.13039\/501100001821","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u201cBigDAMA\u201d"},{"name":"SmartData@PoliTO center for data science and big data"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/tnsm.2019.2927409","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T20:09:31Z","timestamp":1562702971000},"page":"814-827","source":"Crossref","is-referenced-by-count":5,"title":["LENTA: Longitudinal Exploration for Network Traffic Analysis From Passive Data"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3765-3067","authenticated-orcid":false,"given":"Andrea","family":"Morichetta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1859-6693","authenticated-orcid":false,"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653738"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ITC30.2018.00035"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-28.2016.146"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.12"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_31"},{"key":"ref37","first-page":"7","article-title":"A foray into Conficker&#x2019;s logic and rendezvous points","volume":"9","author":"porras","year":"2009","journal-title":"Proc lEE"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868453"},{"key":"ref35","first-page":"14","article-title":"Behavioral clustering of HTTP-based malware and signature generation using malicious network traces","volume":"10","author":"perdisci","year":"2010","journal-title":"Proc NSDI"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503255"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2015.7237086"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627557"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.031"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737792"},{"key":"ref15","first-page":"35","article-title":"Detecting and characterizing social spam campaigns","author":"gao","year":"2010","journal-title":"Proc ACM IMC"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2016.2517004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.011714.130505"},{"key":"ref18","first-page":"139","article-title":"BotMiner: Clustering analysis of network traffic for protocol-and structure-independent BotNet detection","author":"gu","year":"2008","journal-title":"Proc of SSN"},{"key":"ref19","first-page":"1","article-title":"Botsniffer: Detecting BotNet command and control channels in network traffic","author":"gu","year":"2008","journal-title":"Proc NDSS"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14778\/3021924.3021932"},{"key":"ref4","first-page":"491","article-title":"From throw-away traffic to bots: Detecting the rise of DGA-based malware","volume":"12","author":"antonakakis","year":"2012","journal-title":"Proc Usenix Security Symp"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IMSCCS.2007.52"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004227"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.85"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2597443"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37456-2_14"},{"key":"ref7","first-page":"1","article-title":"EXPOSURE: Finding malicious domains using passive DNS analysis","author":"bilge","year":"2011","journal-title":"Proc NDSS"},{"journal-title":"Hiding in plain sight Malware's use of tls and encryption","year":"2016","author":"anderson","key":"ref2"},{"key":"ref9","first-page":"73","article-title":"A comparison of string distance metrics for name-matching tasks","author":"cohen","year":"2003","journal-title":"Proc IJCAI Workshop Inf Integr Web"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/b15410"},{"key":"ref46","first-page":"311","article-title":"Data structures and algorithms for nearest neighbor search in general metric spaces","volume":"93","author":"yianilos","year":"1993","journal-title":"Proc SODA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2016.57"},{"key":"ref45","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"wright","year":"2006","journal-title":"J Mach Learn Res"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/rs9121301"},{"journal-title":"Clustering Algorithms","year":"1975","author":"hartigan","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281433"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18467-8_17"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600756CM"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2017.8117145"},{"key":"ref44","article-title":"Design and optimization of DBSCAN algorithm based on CUDA","author":"wang","year":"2015","journal-title":"arXiv preprint arXiv 1506 03857"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863129"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577032"},{"key":"ref25","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Phys Doklady"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/8827375\/08758184.pdf?arnumber=8758184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:05:46Z","timestamp":1657746346000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8758184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2019.2927409","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2019,9]]}}}