{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T14:24:44Z","timestamp":1768400684568,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T00:00:00Z","timestamp":1512691200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,8]]},"DOI":"10.1145\/3171592.3171597","type":"proceedings-article","created":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T12:53:36Z","timestamp":1521204816000},"page":"92-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Network Behavioral Features for Detecting Remote Access Trojans in the Early Stage"],"prefix":"10.1145","author":[{"given":"Khin Swe","family":"Yin","sequence":"first","affiliation":[{"name":"University of computer Studies, Yangon, Myanmar"}]},{"given":"May Aye","family":"Khine","sequence":"additional","affiliation":[{"name":"University of computer Studies, Yangon, Myanmar"}]}],"member":"320","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Shamir U.2015. The 7 Most Common RATS In Use Today. (Online) Available:https:\/\/www.darkreading.com\/perimeter\/the-7-most-common-rats-in-use-today-\/a\/d-id\/1321965?  Shamir U.2015. The 7 Most Common RATS In Use Today. (Online) Available:https:\/\/www.darkreading.com\/perimeter\/the-7-most-common-rats-in-use-today-\/a\/d-id\/1321965?"},{"key":"e_1_3_2_1_2_1","volume-title":"Computer Viruses and Malware. Advances in Information Security","author":"Aycock J.","unstructured":"Aycock , J. 2006. Computer Viruses and Malware. Advances in Information Security , Springer . Aycock, J.2006. Computer Viruses and Malware. Advances in Information Security, Springer."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2012.10"},{"key":"e_1_3_2_1_6_1","volume-title":"An Approach To Detect Remote Access Trojans in the Early Stage Of Communication. InProceedings of IEEE 29th International Conference on Advanced Information Networking and Applications","author":"Jiang D.","year":"2015","unstructured":"Jiang , D. , and Omote , K . 2015 . An Approach To Detect Remote Access Trojans in the Early Stage Of Communication. InProceedings of IEEE 29th International Conference on Advanced Information Networking and Applications ( Gwangiu, South Korea , March 24-27, 2015 ). Jiang, D., and Omote, K. 2015. An Approach To Detect Remote Access Trojans in the Early Stage Of Communication. InProceedings of IEEE 29th International Conference on Advanced Information Networking and Applications(Gwangiu, South Korea, March 24-27, 2015)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-013-0944-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.39"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2991\/jimet-15.2015.44"},{"key":"e_1_3_2_1_10_1","volume-title":"Practical Packet Analysis using Wireshark to solve real-world Network Problems","author":"Sanders C.","unstructured":"Sanders , C. 2011. Practical Packet Analysis using Wireshark to solve real-world Network Problems , 2 nd Edition, 165--168. Sanders, C. 2011. Practical Packet Analysis using Wireshark to solve real-world Network Problems, 2nd Edition, 165--168.","edition":"2"},{"key":"e_1_3_2_1_11_1","unstructured":"Wireshark. (Online) Available: https:\/\/www.wireshark.org.  Wireshark. (Online) Available: https:\/\/www.wireshark.org."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35488-8_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_14_1","unstructured":"Villacampa O. 2015. Feature Selection and Classification Methods for Decision Making A Comparative Analysis.  Villacampa O. 2015. Feature Selection and Classification Methods for Decision Making A Comparative Analysis."},{"key":"e_1_3_2_1_15_1","volume-title":"Manning","author":"Harrington P.","unstructured":"Harrington , P. 2012. Machine Learning in Action , Manning , Shelter Island , NY , 28--178. Harrington, P. 2012. Machine Learning in Action, Manning, Shelter Island, NY, 28--178."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.90"},{"key":"e_1_3_2_1_17_1","unstructured":"Mitchell T.M. McGrawHill 1997.MachineLearning.   Mitchell T.M. McGrawHill 1997.MachineLearning."}],"event":{"name":"ICNCC 2017: 2017 VI International Conference on Network, Communication and Computing","location":"Kunming China","acronym":"ICNCC 2017"},"container-title":["Proceedings of the 2017 VI International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3171592.3171597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:53Z","timestamp":1750215773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3171592.3171597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,8]]},"references-count":17,"alternative-id":["10.1145\/3171592.3171597","10.1145\/3171592"],"URL":"https:\/\/doi.org\/10.1145\/3171592.3171597","relation":{},"subject":[],"published":{"date-parts":[[2017,12,8]]},"assertion":[{"value":"2017-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}