{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:41Z","timestamp":1750306181695,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970038","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting the Behavioral Relationships of Malware Connections"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Garcia","sequence":"first","affiliation":[{"name":"Czech Technical University, FEE, Prague, Czech Republic"}]},{"given":"Michal","family":"Pechoucek","sequence":"additional","affiliation":[{"name":"Czech Technical University, FEE, Prague, Czech Republic"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Virus Bulletin, number September","author":"Garcia S.","year":"2015","unstructured":"S. Garcia . Modelling the Network Behaviour of Malware To Block Malicious Patterns. the Stratosphere Project: a Behavioural Ips . In Virus Bulletin, number September , pages 1 -- 8 , 2015 . S. Garcia. Modelling the Network Behaviour of Malware To Block Malicious Patterns. the Stratosphere Project: a Behavioural Ips. In Virus Bulletin, number September, pages 1--8, 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602945.2602949"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2013.6504162"},{"key":"e_1_3_2_1_5_1","volume-title":"Security Vendors Teaching Bad Actors How to Get Past Firewalls","author":"Patterson M.","year":"2015","unstructured":"M. Patterson . Security Vendors Teaching Bad Actors How to Get Past Firewalls , 2015 . M. Patterson. Security Vendors Teaching Bad Actors How to Get Past Firewalls, 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"36","volume":"7","author":"Zeidanloo H. R.","year":"2010","unstructured":"H. R. Zeidanloo and A. B. A. Manaf . Botnet Detection by Monitoring Similar Communication Patterns. International Journal of Computer Science and Information Security , 7 ( 3 ): 36 -- 45 , 2010 . H. R. Zeidanloo and A. B. A. Manaf. Botnet Detection by Monitoring Similar Communication Patterns. International Journal of Computer Science and Information Security, 7(3):36--45, 2010.","journal-title":"Monitoring Similar Communication Patterns. International Journal of Computer Science and Information Security"}],"event":{"name":"PrAISe '16: International Workshop on AI for Privacy and Security","acronym":"PrAISe '16","location":"The Hague Netherlands"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":7,"alternative-id":["10.1145\/2970030.2970038","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970038","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}