{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:14:59Z","timestamp":1758845699580,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,14]]},"DOI":"10.1145\/3314545.3314562","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T16:30:09Z","timestamp":1555518609000},"page":"116-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["An Analysis of Botnet Models"],"prefix":"10.1145","author":[{"given":"Polly","family":"Wainwright","sequence":"first","affiliation":[{"name":"The Department of Computing and Information Sciences, Valparaiso University, Valparaiso, Indiana, USA and The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"}]},{"given":"Houssain","family":"Kettani","sequence":"additional","affiliation":[{"name":"The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233280"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659673"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11634-012-0122-2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0074-7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3107010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3090354.3090383"},{"key":"e_1_3_2_1_8_1","volume-title":"ENISA threat landscape report 2018: 15 top cyber-threats and trends. Heraklion: ENISA","author":"European Union Agency for Network and Information Security (ENISA).","year":"2019","unstructured":"European Union Agency for Network and Information Security (ENISA). ( 2019 ). ENISA threat landscape report 2018: 15 top cyber-threats and trends. Heraklion: ENISA . European Union Agency for Network and Information Security (ENISA). (2019). ENISA threat landscape report 2018: 15 top cyber-threats and trends. Heraklion: ENISA."},{"key":"e_1_3_2_1_9_1","volume-title":"IoT technology disruptions: A Gartner trend insight report (Report ID G00331334)","author":"Ganguli S.","year":"2017","unstructured":"Ganguli , S. , & Friedman , T. ( 2017 ). IoT technology disruptions: A Gartner trend insight report (Report ID G00331334) . Stamford, CT : Gartner . https:\/\/www.gartner.com\/en\/doc\/3738060-iot-technology-disruptions Ganguli, S., & Friedman, T. (2017). IoT technology disruptions: A Gartner trend insight report (Report ID G00331334). Stamford, CT: Gartner. https:\/\/www.gartner.com\/en\/doc\/3738060-iot-technology-disruptions"},{"key":"e_1_3_2_1_10_1","volume-title":"GIMPS history. GIMPS. https:\/\/www.mersenne.org\/various\/history.php","author":"Great Internet Mersenne Prime","year":"2018","unstructured":"Great Internet Mersenne Prime Search (GIMPS). ( 2018 ). GIMPS history. GIMPS. https:\/\/www.mersenne.org\/various\/history.php Great Internet Mersenne Prime Search (GIMPS). (2018). GIMPS history. GIMPS. https:\/\/www.mersenne.org\/various\/history.php"},{"key":"e_1_3_2_1_11_1","volume-title":"D., Gerhards-Padilla","author":"Hogben G.","year":"2011","unstructured":"Hogben , G. (Ed.), Plohmann , D., Gerhards-Padilla , E., Leder, F. ( 2011 ). Botnets : Measurement, Detection, Disinfection and Defense . Heraklion : ENISA Hogben, G. (Ed.), Plohmann, D., Gerhards-Padilla, E., Leder, F. (2011). Botnets: Measurement, Detection, Disinfection and Defense. Heraklion: ENISA"},{"key":"e_1_3_2_1_12_1","volume-title":"Know your enemy","author":"Honeynet Project","year":"2004","unstructured":"Honeynet Project . ( 2004 ). Know your enemy ; learning about security threats ( 2 nd ed.). Boston, MA : Addison-Wesley . Honeynet Project. (2004). Know your enemy; learning about security threats (2nd ed.). Boston, MA: Addison-Wesley.","edition":"2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2487980"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323129"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi10050043"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298349"},{"key":"e_1_3_2_1_18_1","volume-title":"Policy brief: Botnets","author":"Internet Society","year":"2015","unstructured":"Internet Society . ( 2015 ). Policy brief: Botnets . Reston, VA : Internet Society . Internet Society. (2015). Policy brief: Botnets. Reston, VA: Internet Society."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190645.3190678"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/882489.884191"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.020"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00245-016-9389-6"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/5992.895191"},{"key":"e_1_3_2_1_24_1","unstructured":"Laurent G. (2018 October 4). What is bot management? ORACLE Dyn. https:\/\/dyn.com\/blog\/what-is-bot-management\/  Laurent G. (2018 October 4). What is bot management? ORACLE Dyn. https:\/\/dyn.com\/blog\/what-is-bot-management\/"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2014.931488"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_12"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/692654"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2179298.2179332"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501659"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"key":"e_1_3_2_1_31_1","volume-title":"Modeling and analyzing of botnet interactions. Physica A: Statistical Mechanics and its Applications, 390(2), 347--358","author":"Song L.","year":"2011","unstructured":"Song , L. , Jin , Z. , Sun , G. ( 2011 ). Modeling and analyzing of botnet interactions. Physica A: Statistical Mechanics and its Applications, 390(2), 347--358 . Song, L., Jin, Z., Sun, G. (2011). Modeling and analyzing of botnet interactions. Physica A: Statistical Mechanics and its Applications, 390(2), 347--358."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490951890"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.agsy.2005.11.004"},{"key":"e_1_3_2_1_34_1","unstructured":"Turiel A. (2017 July 17). Legitimate botnets do exist. Cyren. https:\/\/www.cyren.com\/blog\/articles\/legitimate-botnets-do-exist  Turiel A. (2017 July 17). Legitimate botnets do exist. Cyren. https:\/\/www.cyren.com\/blog\/articles\/legitimate-botnets-do-exist"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167306"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3555-3"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1518"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851802"}],"event":{"name":"ICCDA 2019: 2019 The 3rd International Conference on Compute and Data Analysis","acronym":"ICCDA 2019","location":"Kahului HI USA"},"container-title":["Proceedings of the 2019 3rd International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3314562","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314545.3314562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:30Z","timestamp":1750204410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3314562"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":38,"alternative-id":["10.1145\/3314545.3314562","10.1145\/3314545"],"URL":"https:\/\/doi.org\/10.1145\/3314545.3314562","relation":{},"subject":[],"published":{"date-parts":[[2019,3,14]]},"assertion":[{"value":"2019-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}