{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:53:04Z","timestamp":1771462384680,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T00:00:00Z","timestamp":1401062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001420","name":"Department of Information Technology, Ministry of Communications and Information Technology","doi-asserted-by":"publisher","award":["12(13)\/2012-ESD"],"award-info":[{"award-number":["12(13)\/2012-ESD"]}],"id":[{"id":"10.13039\/501100001420","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,26]]},"DOI":"10.1145\/2611286.2611318","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"338-341","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Machine-learning approaches for P2P botnet detection using signal-processing techniques"],"prefix":"10.1145","author":[{"given":"Pratik","family":"Narang","sequence":"first","affiliation":[{"name":"Birla Institute of Technology &amp; Science-Pilani, Hyderabad, Andhra Pradesh, India"}]},{"given":"Vansh","family":"Khurana","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology &amp; Science-Pilani, Hyderabad, Andhra Pradesh, India"}]},{"given":"Chittaranjan","family":"Hota","sequence":"additional","affiliation":[{"name":"Birla Institute of Technology &amp; Science-Pilani, Hyderabad, Andhra Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2014,5,26]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"IFIP Networking Conference, 2013","author":"Hang H.","year":"2013","unstructured":"H. Hang , X. Wei , M. Faloutsos , and T. Eliassi-Rad . Entelecheia: Detecting p2p botnets in their waiting stage . In IFIP Networking Conference, 2013 , pages 1 -- 9 , 2013 . H. Hang, X. Wei, M. Faloutsos, and T. Eliassi-Rad. Entelecheia: Detecting p2p botnets in their waiting stage. In IFIP Networking Conference, 2013, pages 1--9, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISECS.2009.61"},{"key":"e_1_3_2_1_3_1","first-page":"15","volume-title":"USENIX Security Symposium","author":"Kanich C.","year":"2011","unstructured":"C. Kanich , N. Weaver , D. McCoy , T. Halvorson , C. Kreibich , K. Levchenko , V. Paxson , G. M. Voelker , and S. Savage . Show me the money: Characterizing spam-advertised revenue . In USENIX Security Symposium , pages 15 -- 15 , 2011 . C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. M. Voelker, and S. Savage. Show me the money: Characterizing spam-advertised revenue. In USENIX Security Symposium, pages 15--15, 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.17"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971980"},{"key":"e_1_3_2_1_7_1","volume-title":"Detecting peer-to-peer botnets","author":"Schoof R.","year":"2007","unstructured":"R. Schoof and R. Koning . Detecting peer-to-peer botnets . University of Amsterdam , 2007 . Technical report. R. Schoof and R. Koning. Detecting peer-to-peer botnets. University of Amsterdam, 2007. Technical report."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413217"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.76"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.5.568-576"},{"issue":"1","key":"e_1_3_2_1_11_1","first-page":"27","article-title":"Building a scalable system for stealthy p2p-botnet detection. Information Forensics and Security","volume":"9","author":"Zhang J.","year":"2014","unstructured":"J. Zhang , R. Perdisci , W. Lee , X. Luo , and U. Sarfraz . Building a scalable system for stealthy p2p-botnet detection. Information Forensics and Security , IEEE Transactions on , 9 ( 1 ): 27 -- 38 , 2014 . J. Zhang, R. Perdisci, W. Lee, X. Luo, and U. Sarfraz. Building a scalable system for stealthy p2p-botnet detection. Information Forensics and Security, IEEE Transactions on, 9(1):27--38, 2014.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958212"},{"key":"e_1_3_2_1_13_1","first-page":"2","volume-title":"Conversation-based","author":"Zhang S.","year":"2013","unstructured":"S. Zhang . Conversation-based p 2 p botnet detection with decision fusion. Master's thesis, Fredericton : University of New Brunswick , 2013 . S. Zhang. Conversation-based p2p botnet detection with decision fusion. Master's thesis, Fredericton: University of New Brunswick, 2013."}],"event":{"name":"DEBS '14: The 8th ACM International Conference on Distributed Event-Based Systems","location":"Mumbai India","acronym":"DEBS '14","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611286.2611318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2611286.2611318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:04Z","timestamp":1750229764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2611286.2611318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,26]]},"references-count":13,"alternative-id":["10.1145\/2611286.2611318","10.1145\/2611286"],"URL":"https:\/\/doi.org\/10.1145\/2611286.2611318","relation":{},"subject":[],"published":{"date-parts":[[2014,5,26]]},"assertion":[{"value":"2014-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}