{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:51Z","timestamp":1750307571326,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,22]],"date-time":"2009-11-22T00:00:00Z","timestamp":1258848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,22]]},"DOI":"10.1145\/1658550.1658560","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Botnet-inspired architecture for interactive spaces"],"prefix":"10.1145","author":[{"given":"Iv\u00e1n","family":"S\u00e1nchez","sequence":"first","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Erno","family":"Kuusela","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Sebastian","family":"Turpeinen","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Juha","family":"R\u00f6ning","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]},{"given":"Jukka","family":"Riekki","sequence":"additional","affiliation":[{"name":"University of Oulu, Oulu, Finland"}]}],"member":"320","published-online":{"date-parts":[[2009,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.393.0915"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303111"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378631"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/832315.837560"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.35"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the USENIX SRUTI Workshop","author":"Cooke F","year":"2005","unstructured":"E Cooke , F Jahanian , D ?McPherson ( 2005 ) The zombie roundup: Understanding, detecting, and disrupting botnets . Proceedings of the USENIX SRUTI Workshop 2005. E Cooke, F Jahanian, D ?McPherson (2005) The zombie roundup: Understanding, detecting, and disrupting botnets. Proceedings of the USENIX SRUTI Workshop 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"An inside look at botnets. Malware Detection, ser. Advances in Information Security","author":"Barford V","year":"2006","unstructured":"P Barford , V Yegneswaran ( 2006 ) An inside look at botnets. Malware Detection, ser. Advances in Information Security . P Barford, V Yegneswaran (2006) An inside look at botnets. Malware Detection, ser. Advances in Information Security."},{"key":"e_1_3_2_1_10_1","volume-title":"Extensible Messaging and Presence Protocol (XMPP): Core. IETF RFC 3920","author":"Saint-Andre","year":"2004","unstructured":"P. Saint-Andre , Ed ( 2004 ). Extensible Messaging and Presence Protocol (XMPP): Core. IETF RFC 3920 . P. Saint-Andre, Ed (2004). Extensible Messaging and Presence Protocol (XMPP): Core. IETF RFC 3920."},{"key":"e_1_3_2_1_11_1","volume-title":"Greater NOrdic MIddleware Symposium http:\/\/www.gnomis.org\/presentasjoner\/oslo2005\/xmpp.pdf","author":"Johansson","year":"2005","unstructured":"Johansson , Leif ( 2005 ). XMPP as MOM (presentation) , Greater NOrdic MIddleware Symposium http:\/\/www.gnomis.org\/presentasjoner\/oslo2005\/xmpp.pdf Johansson, Leif (2005). XMPP as MOM (presentation), Greater NOrdic MIddleware Symposium http:\/\/www.gnomis.org\/presentasjoner\/oslo2005\/xmpp.pdf"},{"key":"e_1_3_2_1_12_1","volume-title":"Cloud Control with Google Talk (Botnets). SAP Developer's Journal","author":"Cohen","year":"2009","unstructured":"Cohen , Reuven ( 2009 ). Cloud Control with Google Talk (Botnets). SAP Developer's Journal . http:\/\/sap.sys-con.com\/node\/831594 Cohen, Reuven (2009). Cloud Control with Google Talk (Botnets). SAP Developer's Journal. http:\/\/sap.sys-con.com\/node\/831594"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69293-5_44"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1329469.1329485"},{"key":"e_1_3_2_1_15_1","volume-title":"Select Committee on Science and Technology Fifth Report","author":"UK House of Lords Science and Technology Committee","year":"2007","unstructured":"UK House of Lords Science and Technology Committee ( 2007 ). Select Committee on Science and Technology Fifth Report . http:\/\/www.publications.parliament.uk\/pa\/ld200607\/ldselect\/ldsctech\/165\/16502.htm UK House of Lords Science and Technology Committee (2007). Select Committee on Science and Technology Fifth Report. http:\/\/www.publications.parliament.uk\/pa\/ld200607\/ldselect\/ldsctech\/165\/16502.htm"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2008.172"},{"key":"e_1_3_2_1_17_1","unstructured":"NFC Forum. The Keys to Truly Interoperable Communications. Accessible from http:\/\/www.nfc-forum.org\/resources\/white_papers. Last Access: 20.08.09  NFC Forum. The Keys to Truly Interoperable Communications. Accessible from http:\/\/www.nfc-forum.org\/resources\/white_papers. Last Access: 20.08.09"},{"key":"e_1_3_2_1_18_1","unstructured":"Mahemoff M. 2006. Ajax Design Patterns. O'Reilly.   Mahemoff M. 2006. Ajax Design Patterns. O'Reilly."},{"key":"e_1_3_2_1_19_1","unstructured":"http:\/\/www.infoq.com\/articles\/rest-introduction. Last accessed 20.08.09.  http:\/\/www.infoq.com\/articles\/rest-introduction. Last accessed 20.08.09."},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/wave.google.com\/help\/wave\/about.html. Last accessed 8.10.09.  http:\/\/wave.google.com\/help\/wave\/about.html. Last accessed 8.10.09."}],"event":{"name":"MUM '09: 8th International Conference on Mobile and Ubiquitous Multimedia","sponsor":["University of Cambridge University of Cambridge","Microsoft Research Microsoft Research","Nokia Research Center","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Cambridge United Kingdom","acronym":"MUM '09"},"container-title":["Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1658550.1658560","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1658550.1658560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:02Z","timestamp":1750250462000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1658550.1658560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,22]]},"references-count":20,"alternative-id":["10.1145\/1658550.1658560","10.1145\/1658550"],"URL":"https:\/\/doi.org\/10.1145\/1658550.1658560","relation":{},"subject":[],"published":{"date-parts":[[2009,11,22]]},"assertion":[{"value":"2009-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}