{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:53:55Z","timestamp":1772063635824,"version":"3.50.1"},"reference-count":58,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T00:00:00Z","timestamp":1428019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science and Technology, Executive Yuan, Taiwan R.O.C."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2015,4,3]]},"abstract":"<jats:p>In today's world, Botnet has become one of the greatest threats to network security. Network attackers, or Botmasters, use Botnet to launch the Distributed Denial of Service (DDoS) to paralyze large-scale websites or steal confidential data from infected computers. They also employ \u201cphishing\u201d attacks to steal sensitive information (such as users\u2019 accounts and passwords), send bulk email advertising, and\/or conduct click fraud. Even though detection technology has been much improved and some solutions to Internet security have been proposed and improved, the threat of Botnet still exists. Most of the past studies dealing with this issue used either packet contents or traffic flow characteristics to identify the invasion of Botnet. However, there still exist many problems in the areas of packet encryption and data privacy, simply because Botnet can easily change the packet contents and flow characteristics to circumvent the Intrusion Detection System (IDS). This study combines Particle Swarm Optimization (PSO) and K-means algorithms to provide a solution to remedy those problems and develop, step by step, a mechanism for Botnet detection. First, three important network behaviors are identified: long active communication behavior (ActBehavior), connection failure behavior (FailBehavior), and network scanning behavior (ScanBehavior). These behaviors are defined according to the relevant prior studies and used to analyze the communication activities among the infected computers. Second, the features of network behaviors are extracted from the flow traces in the network layer and transport layer of the network equipment. Third, PSO and K-means techniques are used to uncover the host members of Botnet in the organizational network. This study mainly utilizes the flow traces of a campus network as an experiment. The experimental findings show that this proposed approach can be employed to detect the suspicious Botnet members earlier than the detection application systems. In addition, this proposed approach is easy to implement and can be further used and extended in the campus dormitory network, home networks, and the mobile 3G network.<\/jats:p>","DOI":"10.1145\/2676869","type":"journal-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T20:29:44Z","timestamp":1428092984000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means"],"prefix":"10.1145","volume":"6","author":[{"given":"Shing-Han","family":"Li","sequence":"first","affiliation":[{"name":"Department of Accounting Information, National Taipei University of Business, Taipei, Taiwan"}]},{"given":"Yu-Cheng","family":"Kao","sequence":"additional","affiliation":[{"name":"Department of Information Management, Tatung University, Taipei, Taiwan"}]},{"given":"Zong-Cyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Information Management, Tatung University, Taipei, Taiwan"}]},{"given":"Ying-Ping","family":"Chuang","sequence":"additional","affiliation":[{"name":"Department of Information Management, Tatung University, Taipei, Taiwan"}]},{"given":"David C.","family":"Yen","sequence":"additional","affiliation":[{"name":"School of Economics and Business, SUNY College at Oneonta, Department of Information Systems and Analytics, Oneonta, NY"}]}],"member":"320","published-online":{"date-parts":[[2015,4,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"B. Acohido and J. Swartz. 2009. Hacker attack takes down Twitter Facebook LiveJournal. Retrieved from http:\/\/www.usatoday.com.  B. Acohido and J. Swartz. 2009. Hacker attack takes down Twitter Facebook LiveJournal. Retrieved from http:\/\/www.usatoday.com."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 2008 International Symposium on Telecommunications (IST\u201908)","author":"Ahmadyfard A.","unstructured":"A. Ahmadyfard and H. Modares . 2008. Combining PSO and k-means to enhance data clustering . In Proceedings of the 2008 International Symposium on Telecommunications (IST\u201908) . 688--691. A. Ahmadyfard and H. Modares. 2008. Combining PSO and k-means to enhance data clustering. In Proceedings of the 2008 International Symposium on Telecommunications (IST\u201908). 688--691."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the IEEE World Congress on Computational Intelligence (WCCI\u201908)","author":"Al-Hammadi Y.","unstructured":"Y. Al-Hammadi , U. Aickelin , and J. Greensmith . 2008. DCA for bot detection . In Proceedings of the IEEE World Congress on Computational Intelligence (WCCI\u201908) . Y. Al-Hammadi, U. Aickelin, and J. Greensmith. 2008. DCA for bot detection. In Proceedings of the IEEE World Congress on Computational Intelligence (WCCI\u201908)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.02.003"},{"key":"e_1_2_1_5_1","first-page":"4469","article-title":"A novel approach for the early detection and identification of botnets","volume":"403","author":"Benson Edwin Raj S.","year":"2012","unstructured":"S. Benson Edwin Raj and R. Shalini . 2012 . A novel approach for the early detection and identification of botnets . Advanced Materials Research 403 , 4469 -- 4475 . S. Benson Edwin Raj and R. Shalini. 2012. A novel approach for the early detection and identification of botnets. Advanced Materials Research 403, 4469--4475.","journal-title":"Advanced Materials Research"},{"key":"e_1_2_1_6_1","first-page":"9","article-title":"Traffic flow measurement: Architecture","volume":"2722","author":"Brownlee N.","year":"1999","unstructured":"N. Brownlee , C. Mills , and G. Ruth . 1999 . Traffic flow measurement: Architecture . IETF. RFC 2722. 9 -- 12 . N. Brownlee, C. Mills, and G. Ruth. 1999. Traffic flow measurement: Architecture. IETF. RFC 2722. 9--12.","journal-title":"IETF. RFC"},{"key":"e_1_2_1_7_1","unstructured":"J. Carr. 2009. Inside Cyber Warfare. O\u2019Reilly Media.  J. Carr. 2009. Inside Cyber Warfare. O\u2019Reilly Media."},{"key":"e_1_2_1_8_1","article-title":"Document clustering analysis based on hybrid PSO&plus;K-means algorithm","author":"Cui X.","year":"2005","unstructured":"X. Cui and T. E. Potok . 2005 . Document clustering analysis based on hybrid PSO&plus;K-means algorithm . Journal of Computer Sciences (Special Issue), 27--33. X. Cui and T. E. Potok. 2005. Document clustering analysis based on hybrid PSO&plus;K-means algorithm. Journal of Computer Sciences (Special Issue), 27--33.","journal-title":"Journal of Computer Sciences (Special Issue), 27--33."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiolchem.2008.03.020"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 6th International Symposium on Micromachine Human Sciences, 39--43","author":"Eberhart R.","unstructured":"R. Eberhart and J. Kennedy . 1995. A new optimizer using particle swarm theory . In Proceedings of the 6th International Symposium on Micromachine Human Sciences, 39--43 . R. Eberhart and J. Kennedy. 1995. A new optimizer using particle swarm theory. In Proceedings of the 6th International Symposium on Micromachine Human Sciences, 39--43."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.1.235-243"},{"key":"e_1_2_1_14_1","unstructured":"German Honeynet Project. 2005. Tracking botnets. Retrieved from http:\/\/www.honeynet.org\/papers\/bots.  German Honeynet Project. 2005. Tracking botnets. Retrieved from http:\/\/www.honeynet.org\/papers\/bots."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 16th USENIX Security Symposium. 167--182","author":"Gu G.","unstructured":"G. Gu , P. Porras , V. Yegneswaran , M. Frog , and W. Lee . 2007. BotHunter: Detecting malware infection through ids-driven dialog correlation . In Proceedings of the 16th USENIX Security Symposium. 167--182 . G. Gu, P. Porras, V. Yegneswaran, M. Frog, and W. Lee. 2007. BotHunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium. 167--182."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 15th Annual Network &amp; Distributed System Security Symposium (NDSS&rsquo;\u201908)","author":"Gu G.","unstructured":"G. Gu , J. Zhang , and W. Lee . 2008. BotSniffer: Detecting botnet command and control channels in network traffic . In Proceedings of the 15th Annual Network &amp; Distributed System Security Symposium (NDSS&rsquo;\u201908) . G. Gu, J. Zhang, and W. Lee. 2008. BotSniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the 15th Annual Network &amp; Distributed System Security Symposium (NDSS&rsquo;\u201908)."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 17th USENIX Security Symposium. 139--154","author":"Gu G.","unstructured":"G. Gu , R. Perdisci , J. Zhang , and W. Lee . 2008. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection . In Proceedings of the 17th USENIX Security Symposium. 139--154 . G. Gu, R. Perdisci, J. Zhang, and W. Lee. 2008. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th USENIX Security Symposium. 139--154."},{"key":"e_1_2_1_18_1","unstructured":"F. Hacquebord. 2011. Esthost Taken Down\u2014Biggest Cybercriminal Takedown in History. Retrieved from http:\/\/www.trendmicro.com.  F. Hacquebord. 2011. Esthost Taken Down\u2014Biggest Cybercriminal Takedown in History. Retrieved from http:\/\/www.trendmicro.com."},{"key":"e_1_2_1_19_1","volume-title":"Data Mining: Concepts and Techniques.","author":"Han J.","year":"2001","unstructured":"J. Han and M. Kamber . 2001 . Data Mining: Concepts and Techniques. San Francisco : Morgan Kaufmann . J. Han and M. Kamber. 2001. Data Mining: Concepts and Techniques. San Francisco: Morgan Kaufmann."},{"key":"e_1_2_1_20_1","first-page":"126","article-title":"A K-Means clustering algorithm","volume":"28","author":"Hartigan J. A.","year":"1979","unstructured":"J. A. Hartigan , and M. A. Wong . 1979 . A K-Means clustering algorithm . Journal of the Royal Statistical Society Series C 28 , 1, 126 -- 130 . J. A. Hartigan, and M. A. Wong. 1979. A K-Means clustering algorithm. Journal of the Royal Statistical Society Series C 28, 1, 126--130.","journal-title":"Journal of the Royal Statistical Society Series C"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the Global Telecommunications Conference. 1--5.","author":"Huang C. T.","unstructured":"C. T. Huang , K. J. Han , and J. Perretta . 2011. Automatic selection of routers for placing early filters of malicious traffic . In Proceedings of the Global Telecommunications Conference. 1--5. C. T. Huang, K. J. Han, and J. Perretta. 2011. Automatic selection of routers for placing early filters of malicious traffic. In Proceedings of the Global Telecommunications Conference. 1--5."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05948-8_15"},{"key":"e_1_2_1_24_1","unstructured":"J. Kennedy R. Eberhart and Y. H. Shi. 2001. Swarm Intelligence. Morgan Kaufmann.   J. Kennedy R. Eberhart and Y. H. Shi. 2001. Swarm Intelligence. Morgan Kaufmann."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1997.592326"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.08.006"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Y. K. Lam P. W. M. Tsang and C. S. Leung. 2012. PSO-based K-Means clustering with enhanced cluster matching for gene expression data. Neural Computing &amp; Applications 1--7.  Y. K. Lam P. W. M. Tsang and C. S. Leung. 2012. PSO-based K-Means clustering with enhanced cluster matching for gene expression data. Neural Computing &amp; Applications 1--7.","DOI":"10.1007\/s00521-012-0959-5"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2011.184"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.06.010"},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Y. Lin N. Tong M. Shi K. Fan D. Yuan L. Qu and Q. Fu. 2012. K-means optimization clustering algorithm based on particle swarm optimization and multiclass merging. Advances in CSIE 1 168 569--578.  Y. Lin N. Tong M. Shi K. Fan D. Yuan L. Qu and Q. Fu. 2012. K-means optimization clustering algorithm based on particle swarm optimization and multiclass merging. Advances in CSIE 1 168 569--578.","DOI":"10.1007\/978-3-642-30126-1_90"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.04.007"},{"key":"e_1_2_1_33_1","volume-title":"Congress on Evolutionary Computation. 215--220","author":"Merwe V. D.","unstructured":"V. D. Merwe and A. P. Engelbrecht . 2003. Data clustering using particle swarm optimization . Congress on Evolutionary Computation. 215--220 . V. D. Merwe and A. P. Engelbrecht. 2003. Data clustering using particle swarm optimization. Congress on Evolutionary Computation. 215--220."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.826070"},{"key":"e_1_2_1_35_1","unstructured":"McAfee. 2014. McAfee Labs 2014 Threats Predictions.  McAfee. 2014. McAfee Labs 2014 Threats Predictions."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019618.2019622"},{"key":"e_1_2_1_37_1","unstructured":"NetWitness. 2010. NetWitness Discovers Massive ZeuS Compromise. Retrieved from http:\/\/www.netwitness.com.  NetWitness. 2010. NetWitness Discovers Massive ZeuS Compromise. Retrieved from http:\/\/www.netwitness.com."},{"key":"e_1_2_1_38_1","unstructured":"G. Ollmann. 2009. Botnet Communication Topologies. White Paper of Damballa.  G. Ollmann. 2009. Botnet Communication Topologies. White Paper of Damballa."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2012.2588"},{"key":"e_1_2_1_40_1","unstructured":"P. Piskac and J. Novotny. 2011. Network traffic classification based on time characteristics analysis. Masaryk University Faculty of Informatics. 4--14.  P. Piskac and J. Novotny. 2011. Network traffic classification based on time characteristics analysis. Masaryk University Faculty of Informatics. 4--14."},{"key":"e_1_2_1_41_1","first-page":"167","article-title":"A hybrid sequential approach for data clustering using K-Means and particle swarm optimization algorithm","volume":"2","author":"Rana S.","year":"2010","unstructured":"S. Rana , S. Jasola , and R. Kumar . 2010 . A hybrid sequential approach for data clustering using K-Means and particle swarm optimization algorithm . International Journal of Engineering, Science and Technology 2 , 6, 167 -- 176 . S. Rana, S. Jasola, and R. Kumar. 2010. A hybrid sequential approach for data clustering using K-Means and particle swarm optimization algorithm. International Journal of Engineering, Science and Technology 2, 6, 167--176.","journal-title":"International Journal of Engineering, Science and Technology"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the International Conference on Security and Cryptography. 257--262","author":"Rodriguez-Gomez R. A.","unstructured":"R. A. Rodriguez-Gomez , G. Macia-Fernandez , and P. Garcia-Teodoro . 2011. Analysis of botnets though life-cycle . In Proceedings of the International Conference on Security and Cryptography. 257--262 . R. A. Rodriguez-Gomez, G. Macia-Fernandez, and P. Garcia-Teodoro. 2011. Analysis of botnets though life-cycle. In Proceedings of the International Conference on Security and Cryptography. 257--262."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the World Congress on Information and Communication Technologies. 928--933","author":"Rostami M. R.","unstructured":"M. R. Rostami , B. Shanmugam , and N. B. Idris . 2011. Analysis and detection of P2P botnet connections based on node behaviour . In Proceedings of the World Congress on Information and Communication Technologies. 928--933 . M. R. Rostami, B. Shanmugam, and N. B. Idris. 2011. Analysis and detection of P2P botnet connections based on node behaviour. In Proceedings of the World Congress on Information and Communication Technologies. 928--933."},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of the 31st IEEE Conference on Local Computer Networks. 195--202","author":"Strayer W. T.","unstructured":"W. T. Strayer , R. Walsh , C. Livadas , and D. Lapsley . 2006. Detecting botnets with tight command and control . In Proceedings of the 31st IEEE Conference on Local Computer Networks. 195--202 . W. T. Strayer, R. Walsh, C. Livadas, and D. Lapsley. 2006. Detecting botnets with tight command and control. In Proceedings of the 31st IEEE Conference on Local Computer Networks. 195--202."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2011.09.017"},{"key":"e_1_2_1_46_1","volume-title":"Trends for","year":"2009","unstructured":"Symantec. 2010. Trends for 2009 . Symantec Global Internet Security Threat Report , Volume 15. Symantec. 2010. Trends for 2009. Symantec Global Internet Security Threat Report, Volume 15."},{"key":"e_1_2_1_47_1","volume-title":"Trends for","year":"2010","unstructured":"Symantec. 2011. Trends for 2010 . Symantec Global Internet Security Threat Report , Volume 16. Symantec. 2011. Trends for 2010. Symantec Global Internet Security Threat Report, Volume 16."},{"key":"e_1_2_1_48_1","volume-title":"Trends for","year":"2011","unstructured":"Symantec. 2012. Trends for 2011 . Symantec Global Internet Security Threat Report , Volume 17. Symantec. 2012. Trends for 2011. Symantec Global Internet Security Threat Report, Volume 17."},{"key":"e_1_2_1_49_1","volume-title":"Threat Report","year":"2014","unstructured":"Symantec. 2014. Internet Security Threat Report 2014 , Volume 19 . Symantec. 2014. Internet Security Threat Report 2014, Volume 19."},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","unstructured":"H. Tiirmaa-Klaar J. Gassen E. Gerhards-Padilla and P. Martini. 2013. Botnets cybercrime and national security. In Botnets. 1--40.  H. Tiirmaa-Klaar J. Gassen E. Gerhards-Padilla and P. Martini. 2013. Botnets cybercrime and national security. In Botnets. 1--40.","DOI":"10.1007\/978-1-4471-5216-3_1"},{"key":"e_1_2_1_51_1","volume-title":"Tackling the DDoS Threat to Banking","author":"Turner R.","year":"2014","unstructured":"R. Turner . 2014. Tackling the DDoS Threat to Banking in 2014 . White Paper of Alamai . R. Turner. 2014. Tackling the DDoS Threat to Banking in 2014. White Paper of Alamai."},{"key":"e_1_2_1_52_1","first-page":"168","article-title":"Impact of normalization in distributed k-means clustering","volume":"4","author":"Visalakshi N. K.","year":"2009","unstructured":"N. K. Visalakshi and K. Thangavel . 2009 . Impact of normalization in distributed k-means clustering . International Journal of Soft Computing 4 , 4, 168 -- 172 . N. K. Visalakshi and K. Thangavel. 2009. Impact of normalization in distributed k-means clustering. International Journal of Soft Computing 4, 4, 168--172.","journal-title":"International Journal of Soft Computing"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.026"},{"key":"e_1_2_1_54_1","unstructured":"L. Whitney. 2009. Amazon EC2 cloud service hit by botnet outage. Retrieved from http:\/\/news.cnet.com  L. Whitney. 2009. Amazon EC2 cloud service hit by botnet outage. Retrieved from http:\/\/news.cnet.com"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2015956"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201910)","author":"Zeng Y.","unstructured":"Y. Zeng , X. Hu , and K. G. Shin , 2010. Detection of botnets using combined host- and network-level information . In Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201910) . 291--300. Y. Zeng, X. Hu, and K. G. Shin, 2010. Detection of botnets using combined host- and network-level information. In Proceedings of the 2010 IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201910). 291--300."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/1444455.1446211"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the IEEE 2010 3rd International Workshop on Advanced Computational Intelligence (IWACI\u201910)","author":"Zhang Y.","unstructured":"Y. Zhang , Y. Wang , and L. Qi . 2010. Exploring a swarm intelligence methodology to identify command and control flow . In Proceedings of the IEEE 2010 3rd International Workshop on Advanced Computational Intelligence (IWACI\u201910) . 318--322. Y. Zhang, Y. Wang, and L. Qi. 2010. Exploring a swarm intelligence methodology to identify command and control flow. In Proceedings of the IEEE 2010 3rd International Workshop on Advanced Computational Intelligence (IWACI\u201910). 318--322."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.007"}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676869","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2676869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:11:56Z","timestamp":1750227116000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,3]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,4,3]]}},"alternative-id":["10.1145\/2676869"],"URL":"https:\/\/doi.org\/10.1145\/2676869","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"value":"2158-656X","type":"print"},{"value":"2158-6578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,3]]},"assertion":[{"value":"2013-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}