{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:00Z","timestamp":1750308540790,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NWO (Netherlands Organisation for Scientific Research)","award":["628.001.022"],"award-info":[{"award-number":["628.001.022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2714576.2714579","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"97-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["An Empirical Analysis of ZeuS C&amp;C Lifetime"],"prefix":"10.1145","author":[{"given":"Carlos","family":"Ga\u00f1\u00e1n","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Orcun","family":"Cetin","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Michel","family":"van Eeten","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"volume-title":"Sept","year":"2014","key":"e_1_3_2_1_1_1"},{"volume-title":"Oct","year":"2014","author":"Toolbar Netcraft","key":"e_1_3_2_1_2_1"},{"volume-title":"Oct","year":"2014","author":"Total Virus","key":"e_1_3_2_1_3_1"},{"volume-title":"Oct","year":"2014","author":"Web Technology Surveys Techs","key":"e_1_3_2_1_4_1"},{"volume-title":"Sept","year":"2014","author":"Tracker S","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502265"},{"key":"e_1_3_2_1_7_1","first-page":"116","volume-title":"2013 8th International Conference on","author":"Andriesse D.","year":"2013"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028094"},{"key":"e_1_3_2_1_9_1","first-page":"24","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium, Security'12","author":"Antonakakis M.","year":"2012"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.40"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10480264"},{"volume-title":"DEF CON 18 - Hacking conference","year":"2010","author":"Brown D.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1972.tb00899.x"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398778"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323139"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/81.3.515"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598394.2605435"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.11.001"},{"issue":"3","key":"e_1_3_2_1_21_1","first-page":"109","article-title":"Zeuslite","volume":"30","author":"Hannah K.","year":"2015","journal-title":"A Tool for Botnet Analysis in the Classroom. J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1958.10501452"},{"volume-title":"The worldwide governance indicators","year":"2014","author":"Kaufmann D.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.020"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400830329"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGCS.2010.5543027"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413185"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488056"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2307\/2344317"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.023"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501659"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.17"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"volume-title":"Dell SecureWorks Counter Threat Unit(TM) Threat Intelligence","year":"2012","author":"Stone-Gross B.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","first-page":"1","volume-title":"ZeuS Financial Malware. In 13th Annual Workshop on Economics of Information Security (WEIS 2014","author":"Tajalizadehkhoob S.","year":"2014"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1111\/j.2517-6161.1996.tb02080.x","article-title":"Regression shrinkage and selection via the lasso","volume":"58","author":"Tibshirani R.","year":"1994","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2517796"},{"volume-title":"The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. In 9th Annual Workshop on the Economics of Information Security, WEIS 2010","year":"2010","author":"van Eeten M.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2008.43"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684002"},{"key":"e_1_3_2_1_41_1","first-page":"181","volume-title":"Probabilistic Population Study of the Conficker-C Botnet. In Proceedings of the 11th International Conference on Passive and Active Measurement, PAM'10","author":"Weaver R.","year":"2010"},{"key":"e_1_3_2_1_42_1","first-page":"1","volume-title":"Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on","author":"W.","year":"2010"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.38"}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15"},"container-title":["Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714579","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714576.2714579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:56:14Z","timestamp":1750272974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":43,"alternative-id":["10.1145\/2714576.2714579","10.1145\/2714576"],"URL":"https:\/\/doi.org\/10.1145\/2714576.2714579","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}