{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:00Z","timestamp":1750306140056,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T00:00:00Z","timestamp":1503964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,29]]},"DOI":"10.1145\/3098954.3107010","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods"],"prefix":"10.1145","author":[{"given":"Joseph","family":"Divita","sequence":"first","affiliation":[{"name":"US Department of Defense, SPAWAR Systems Center Pacific, San Diego, California, USA"}]},{"given":"Roger A.","family":"Hallman","sequence":"additional","affiliation":[{"name":"US Department of Defense, SPAWAR Systems Center Pacific, Cybersecurity S&amp;T Branch, San Diego, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2012.40"},{"key":"e_1_3_2_1_2_1","unstructured":"JM Bernardo MJ Bayarri JO Berger AP Dawid D Heckerman AFM Smith and M West. 2003. Hierarchical Bayesian models for applications in information retrieval. In Bayesian Statistics 7: Proceedings of the Seventh Valencia International Meeting. Oxford University Press 25.  JM Bernardo MJ Bayarri JO Berger AP Dawid D Heckerman AFM Smith and M West. 2003. Hierarchical Bayesian models for applications in information retrieval. In Bayesian Statistics 7: Proceedings of the Seventh Valencia International Meeting. Oxford University Press 25."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"e_1_3_2_1_4_1","unstructured":"David Blackwell and James B MacQueen. 1973. Ferguson distributions via P\u00f3lya urn schemes. The annals of statistics (1973) 353--355.  David Blackwell and James B MacQueen. 1973. Ferguson distributions via P\u00f3lya urn schemes. The annals of statistics (1973) 353--355."},{"key":"e_1_3_2_1_5_1","unstructured":"Tony Bradley. 2016. Serious Flaws Discovered In Linux: Open Source Security Draws Criticism. Available at http:\/\/antivirus.about.com\/od\/virusdescriptions\/p\/nugache.htm (19\/01\/2017). (2016).  Tony Bradley. 2016. Serious Flaws Discovered In Linux: Open Source Security Draws Criticism. Available at http:\/\/antivirus.about.com\/od\/virusdescriptions\/p\/nugache.htm (19\/01\/2017). (2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Trevor Campbell Sameera Ponda Girish Chowdhary and Jonathan P How. 2012. Planning under uncertainty using nonparametric bayesian models. In AIAA Guidance Navigation and Control Conference (GNC).  Trevor Campbell Sameera Ponda Girish Chowdhary and Jonathan P How. 2012. Planning under uncertainty using nonparametric bayesian models. In AIAA Guidance Navigation and Control Conference (GNC).","DOI":"10.2514\/6.2012-4682"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006392404630469"},{"key":"e_1_3_2_1_8_1","unstructured":"Thomas S Ferguson. 1973. A Bayesian analysis of some nonparametric problems. The annals of statistics (1973) 209--230.  Thomas S Ferguson. 1973. A Bayesian analysis of some nonparametric problems. The annals of statistics (1973) 209--230."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006246600470058"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2014.958916"},{"key":"e_1_3_2_1_13_1","unstructured":"Rafiullah Khan Peter Maynard Kieran McLaughlin David Laverty and Sakir Sezer. 2016. Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. (2016).  Rafiullah Khan Peter Maynard Kieran McLaughlin David Laverty and Sakir Sezer. 2016. Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid. (2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Sheharbano Khattak Naurin Rasheed Ramay Kamran Riaz Khan Affan A Syed and Syed Ali Khayam. 2014. A taxonomy of botnet behavior detection and defense. IEEE communications surveys & tutorials 16 2 (2014) 898--924.  Sheharbano Khattak Naurin Rasheed Ramay Kamran Riaz Khan Affan A Syed and Syed Ali Khayam. 2014. A taxonomy of botnet behavior detection and defense. IEEE communications surveys & tutorials 16 2 (2014) 898--924.","DOI":"10.1109\/SURV.2013.091213.00134"},{"key":"e_1_3_2_1_15_1","unstructured":"Robert M Lee Michael J Assante and Tim Conway. 2016. Analysis of the cyber attack on the Ukrainian power grid. SANS Industrial Control Systems (2016).  Robert M Lee Michael J Assante and Tim Conway. 2016. Analysis of the cyber attack on the Ukrainian power grid. SANS Industrial Control Systems (2016)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.65"},{"key":"e_1_3_2_1_17_1","unstructured":"Peter M\u00fcller and Fernando A Quintana. 2004. Nonparametric Bayesian data analysis. Statistical science (2004) 95--110.  Peter M\u00fcller and Fernando A Quintana. 2004. Nonparametric Bayesian data analysis. Statistical science (2004) 95--110."},{"key":"e_1_3_2_1_18_1","unstructured":"A Nappa A Fattori M Balduzzi M DellfiAmico and L Cavallaro. 2010. Detection of Intrusions and Malware and Vulnerability Assessment ser. Lecture Notes in Computer Science. Springer Berlin\/Heidelberg (2010).  A Nappa A Fattori M Balduzzi M DellfiAmico and L Cavallaro. 2010. Detection of Intrusions and Malware and Vulnerability Assessment ser. Lecture Notes in Computer Science. Springer Berlin\/Heidelberg (2010)."},{"key":"e_1_3_2_1_19_1","unstructured":"Jose Nazario. 2007. Blackenergy ddos bot analysis. Arbor (2007).  Jose Nazario. 2007. Blackenergy ddos bot analysis. Arbor (2007)."},{"key":"e_1_3_2_1_20_1","unstructured":"Jose Nazario. 2009. Politically motivated denial of service attacks. The Virtual Battlefield: Perspectives on Cyber Warfare (2009) 163--181.  Jose Nazario. 2009. Politically motivated denial of service attacks. The Virtual Battlefield: Perspectives on Cyber Warfare (2009) 163--181."},{"volume-title":"Military Communications Conference (MILCOM).","year":"2014","author":"Parameswaran Shibin","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1049\/et.2016.0116"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1049\/et.2016.1112","article-title":"Webcam hack shows vulnerability of connected devices","volume":"11","author":"Pultarova Tereza","year":"2016","journal-title":"Engineering & Technology"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433012"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Jose Romero-Mariona Roger Hallman Megan Kline Geancarlo Palavicini Josiah Bryan John San Miguel Lawrence Kerr Maxine Major and Jorge Alvarez. 2017. An Approach to Organizational Cybersecurity. Springer International Publishing Cham 203--222.  Jose Romero-Mariona Roger Hallman Megan Kline Geancarlo Palavicini Josiah Bryan John San Miguel Lawrence Kerr Maxine Major and Jorge Alvarez. 2017. An Approach to Organizational Cybersecurity. Springer International Publishing Cham 203--222.","DOI":"10.1007\/978-3-319-54380-2_9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971980"},{"key":"e_1_3_2_1_27_1","unstructured":"Jayaram Sethuraman. 1994. A constructive definition of Dirichlet priors. Statistica sinica (1994) 639--650.  Jayaram Sethuraman. 1994. A constructive definition of Dirichlet priors. Statistica sinica (1994) 639--650."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884246"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.130"},{"key":"e_1_3_2_1_30_1","unstructured":"Yee Whye Teh and Michael I Jordan. 2010. Hierarchical Bayesian nonparametric models with applications. Bayesian nonparametrics 1 (2010).  Yee Whye Teh and Michael I Jordan. 2010. Hierarchical Bayesian nonparametric models with applications. Bayesian nonparametrics 1 (2010)."},{"key":"e_1_3_2_1_31_1","unstructured":"Yee Whye Teh Michael I Jordan Matthew J Beal and David M Blei. 2012. Hierarchical dirichlet processes. Journal of the american statistical association (2012).  Yee Whye Teh Michael I Jordan Matthew J Beal and David M Blei. 2012. Hierarchical dirichlet processes. Journal of the american statistical association (2012)."},{"key":"e_1_3_2_1_32_1","first-page":"564","article-title":"Hierarchical Beta Processes and the Indian Buffet Process","volume":"2","author":"Thibaux Romain","year":"2007","journal-title":"AISTATS"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/646648.699353"},{"volume-title":"IPCCC","year":"2006","author":"Zhang Linfeng","key":"e_1_3_2_1_34_1"}],"event":{"name":"ARES '17: International Conference on Availability, Reliability and Security","acronym":"ARES '17","location":"Reggio Calabria Italy"},"container-title":["Proceedings of the 12th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098954.3107010","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3098954.3107010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:26Z","timestamp":1750217846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3098954.3107010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,29]]},"references-count":33,"alternative-id":["10.1145\/3098954.3107010","10.1145\/3098954"],"URL":"https:\/\/doi.org\/10.1145\/3098954.3107010","relation":{},"subject":[],"published":{"date-parts":[[2017,8,29]]},"assertion":[{"value":"2017-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}