{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:55Z","timestamp":1750306795740,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490433","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"36-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Detection of StegoBot"],"prefix":"10.1145","author":[{"given":"V.","family":"Natarajan","sequence":"first","affiliation":[{"name":"PSG College of Technology, Coimbatore, India"}]},{"given":"Shina","family":"Sheen","sequence":"additional","affiliation":[{"name":"PSG College of Technology, Coimbatore, India"}]},{"given":"R.","family":"Anitha","sequence":"additional","affiliation":[{"name":"PSG College of Technology, Coimbatore, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"7","volume-title":"SRUTI'06: Proceedings of the 2nd conference on Reducing unwanted traffic on the internet","author":"Binkley J. R.","year":"2006"},{"first-page":"299","volume-title":"Information Hiding: 13th international conference, IH 2011, LNCS 6958","author":"Shishir","key":"e_1_3_2_1_2_1"},{"volume-title":"proceedings of the 17th USENIX Security Symposium, (Security'08)","author":"Gu G.","key":"e_1_3_2_1_3_1"},{"volume-title":"proceedings of the 19th USENIX conference on Security","author":"Nagaraja S.","key":"e_1_3_2_1_4_1"},{"volume-title":"Technical Report UCAM-CL-TR-746, University of Cambridge.","year":"2009","author":"Nagaraja S.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Mert Rory Sabuncu. 2006. Entropy Based Image Registration Ph.D. dissertation Department of Electrical Engineering Princeton University.  Mert Rory Sabuncu. 2006. Entropy Based Image Registration Ph.D. dissertation Department of Electrical Engineering Princeton University."},{"volume-title":"Proc. of SPIE Medical Imaging.","author":"Bharath S. V.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"first-page":"148","volume-title":"Machine Learning: Proceedings of the Thirteenth International Conference (ICML \"96)","author":"Schapire Robert E.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.709601"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"K. Solanki A sarker and B. S. Manjunath. 2007. YASS:Yet Another Steganographic Scheme that resists blind Steganalysis in Proc.9th Int.Workshop Information Hiding 16--31 Saint Malo France.   K. Solanki A sarker and B. S. Manjunath. 2007. YASS:Yet Another Steganographic Scheme that resists blind Steganalysis in Proc.9 th Int.Workshop Information Hiding 16--31 Saint Malo France.","DOI":"10.1007\/978-3-540-77370-2_2"},{"volume-title":"IH 2001, Pittsburgh, PA, USA.","year":"2001","author":"Westfield A.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"323","volume-title":"10th USENIX Security Symposium","volume":"10","author":"Provos N."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"P. Sallee. 2003. Model-Based Steganography. Lecture Notes in Computer Science Pages 154--167.  P. Sallee. 2003. Model-Based Steganography . Lecture Notes in Computer Science Pages 154--167.","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-005-0194-3"},{"key":"e_1_3_2_1_17_1","unstructured":"http:\/\/www.cs.washington.edu\/research\/  http:\/\/www.cs.washington.edu\/research\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_3_2_1_19_1","unstructured":"Facebook. http:\/\/www.facebook.com  Facebook. http:\/\/www.facebook.com"},{"key":"e_1_3_2_1_20_1","unstructured":"Flickr. http\/\/www.flickr.com  Flickr. http\/\/www.flickr.com"},{"key":"e_1_3_2_1_21_1","unstructured":"JSteg. http:\/\/zooid.org\/~paul\/crypto\/jsteg\/.  JSteg. http:\/\/zooid.org\/~paul\/crypto\/jsteg\/."}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490433"}},"subtitle":["a covert social network botnet"],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":21,"alternative-id":["10.1145\/2490428.2490433","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490433","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}