{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:21:21Z","timestamp":1775071281653,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339272","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild"],"prefix":"10.1145","author":[{"given":"Morteza Safaei","family":"Pour","sequence":"first","affiliation":[{"name":"Cyber Threat Intelligence Laboratory, Florida Atlantic University"}]},{"given":"Antonio","family":"Mangino","sequence":"additional","affiliation":[{"name":"Cyber Threat Intelligence Laboratory, Florida Atlantic University"}]},{"given":"Kurt","family":"Friday","sequence":"additional","affiliation":[{"name":"Cyber Threat Intelligence Laboratory, Florida Atlantic University"}]},{"given":"Matthias","family":"Rathbun","sequence":"additional","affiliation":[{"name":"Cyber Threat Intelligence Laboratory, Florida Atlantic University"}]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[{"name":"Cyber Threat Intelligence Laboratory, Florida Atlantic University"}]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University"}]},{"given":"Khaled","family":"Shaban","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering. Qatar University"}]},{"given":"Abdelkarim","family":"Erradi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering. Qatar University"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/coinhive.com\/. (2018). {Online","year":"2019","unstructured":"2018. Coinhive. https:\/\/coinhive.com\/. (2018). {Online ; accessed 01- March - 2019 }. 2018. Coinhive. https:\/\/coinhive.com\/. (2018). {Online; accessed 01-March-2019}."},{"key":"e_1_3_2_1_2_1","volume-title":"All Things Considered: An Analysis of IoT Devices on Home Networks. In 28th USENIX Security Symposium (USENIX Security 19)","unstructured":"2019. All Things Considered: An Analysis of IoT Devices on Home Networks. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/kumar-deepak 2019. All Things Considered: An Analysis of IoT Devices on Home Networks. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/kumar-deepak"},{"key":"e_1_3_2_1_3_1","volume-title":"ADB.Miner: More Information. https:\/\/blog.netlab.360.com\/adb-miner-more-information-en\/. (2019). {Online","year":"2019","unstructured":"360Netlab. 2019. ADB.Miner: More Information. https:\/\/blog.netlab.360.com\/adb-miner-more-information-en\/. (2019). {Online ; accessed 01- March - 2019 }. 360Netlab. 2019. ADB.Miner: More Information. https:\/\/blog.netlab.360.com\/adb-miner-more-information-en\/. (2019). {Online; accessed 01-March-2019}."},{"key":"e_1_3_2_1_4_1","volume-title":"A Satori Related Botnet Using Block-chain DNS System. https:\/\/tinyurl.com\/yavvhf4v. (2019). {Online","year":"2019","unstructured":"360Netlab. 2019. Fbot , A Satori Related Botnet Using Block-chain DNS System. https:\/\/tinyurl.com\/yavvhf4v. (2019). {Online ; accessed 01- March - 2019 }. 360Netlab. 2019. Fbot, A Satori Related Botnet Using Block-chain DNS System. https:\/\/tinyurl.com\/yavvhf4v. (2019). {Online; accessed 01-March-2019}."},{"key":"e_1_3_2_1_5_1","unstructured":"Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J Alex Halderman Luca Invernizzi Michalis Kallitsis etal 2017. Understanding the Mirai Botnet. (2017).  Manos Antonakakis Tim April Michael Bailey Matt Bernhard Elie Bursztein Jaime Cochran Zakir Durumeric J Alex Halderman Luca Invernizzi Michalis Kallitsis et al. 2017. Understanding the Mirai Botnet. (2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.62"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792424"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1500116NM"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.11.004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTITS.2017.8005665"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Or\u00e7un Cetin Carlos Gan\u00e1n Lisette Altena Takahiro Kasama Daisuke Inoue Kazuki Tamiya Ying Tie Katsunari Yoshioka and Michel van Eeten. 2019. Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. (2019).  Or\u00e7un Cetin Carlos Gan\u00e1n Lisette Altena Takahiro Kasama Daisuke Inoue Kazuki Tamiya Ying Tie Katsunari Yoshioka and Michel van Eeten. 2019. Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. (2019).","DOI":"10.14722\/ndss.2019.23438"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974348.49"},{"key":"e_1_3_2_1_14_1","unstructured":"Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io. (2015).  Fran\u00e7ois Chollet et al. 2015. Keras. https:\/\/keras.io. (2015)."},{"key":"e_1_3_2_1_15_1","first-page":"2493","article-title":"Natural language processing (almost) from scratch","author":"Collobert Ronan","year":"2011","unstructured":"Ronan Collobert , Jason Weston , L\u00e9on Bottou , Michael Karlen , Koray Kavukcuoglu , and Pavel Kuksa . 2011 . Natural language processing (almost) from scratch . Journal of Machine Learning Research 12 , Aug (2011), 2493 -- 2537 . Ronan Collobert, Jason Weston, L\u00e9on Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural language processing (almost) from scratch. Journal of Machine Learning Research 12, Aug (2011), 2493--2537.","journal-title":"Journal of Machine Learning Research 12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2297678"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security Symposium. 65--78","author":"Durumeric Zakir","year":"2014","unstructured":"Zakir Durumeric , Michael Bailey , and J Alex Halderman . 2014 . An Internet-Wide View of Internet-Wide Scanning .. In USENIX Security Symposium. 65--78 . Zakir Durumeric, Michael Bailey, and J Alex Halderman. 2014. An Internet-Wide View of Internet-Wide Scanning.. In USENIX Security Symposium. 65--78."},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium","volume":"8","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric , Eric Wustrow , and J Alex Halderman . 2013 . ZMap: Fast Internet-wide Scanning and Its Security Applications .. In USENIX Security Symposium , Vol. 8 . 47--53. Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications.. In USENIX Security Symposium, Vol. 8. 47--53."},{"key":"e_1_3_2_1_21_1","unstructured":"IBM X-Force Exchange. 2018. JenX Botnet. https:\/\/exchange.xforce.ibmcloud.com\/collection\/JenX-Botnet-c47476c5e6fafd7df487cecd1110a761. (2018). {accessed 01-March-2019}.  IBM X-Force Exchange. 2018. JenX Botnet. https:\/\/exchange.xforce.ibmcloud.com\/collection\/JenX-Botnet-c47476c5e6fafd7df487cecd1110a761. (2018). {accessed 01-March-2019}."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2510"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2497690"},{"key":"e_1_3_2_1_24_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 327--341.","author":"Feng Xuan","unstructured":"Xuan Feng , Qiang Li , Haining Wang , and Limin Sun . 2018. Acquisitional rule-based engine for discovering Internet-of-Things devices . In 27th {USENIX} Security Symposium ({USENIX} Security 18). 327--341. Xuan Feng, Qiang Li, Haining Wang, and Limin Sun. 2018. Acquisitional rule-based engine for discovering Internet-of-Things devices. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 327--341."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2878025"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISP.2006.14"},{"key":"e_1_3_2_1_27_1","volume-title":"Bayesian data analysis","author":"Gelman Andrew","unstructured":"Andrew Gelman , John B Carlin , Hal S Stern , and Donald B Rubin . 2014. Bayesian data analysis . Vol. 2 . Taylor & Francis . Andrew Gelman, John B Carlin, Hal S Stern, and Donald B Rubin. 2014. Bayesian data analysis. Vol. 2. Taylor & Francis."},{"key":"e_1_3_2_1_28_1","volume-title":"Mart\u00edn Ochoa, Nils Tippenhauer, Asaf Shabtai, and Yuval Elovici.","author":"Guarnizo Juan","year":"2017","unstructured":"Juan Guarnizo , Amit Tambe , Suman Sankar Bunia , Mart\u00edn Ochoa, Nils Tippenhauer, Asaf Shabtai, and Yuval Elovici. 2017 . SIPHON : Towards Scalable High-Interaction Physical Honeypots . arXiv preprint arXiv:1701.02446 (2017). Juan Guarnizo, Amit Tambe, Suman Sankar Bunia, Mart\u00edn Ochoa, Nils Tippenhauer, Asaf Shabtai, and Yuval Elovici. 2017. SIPHON: Towards Scalable High-Interaction Physical Honeypots. arXiv preprint arXiv:1701.02446 (2017)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Stephen Herwig Katura Harvey George Hughey Richard Roberts and Dave Levin. 2019. Measurement and Analysis of Hajime a Peer-to-peer IoT Botnet. (2019).  Stephen Herwig Katura Harvey George Hughey Richard Roberts and Dave Levin. 2019. Measurement and Analysis of Hajime a Peer-to-peer IoT Botnet. (2019).","DOI":"10.14722\/ndss.2019.23488"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230837"},{"key":"e_1_3_2_1_31_1","volume-title":"Mart\u0131n Ochoa, Nils Ole Tippenhauer, and Yuval Elovici.","author":"Meidan Yair","year":"2017","unstructured":"Yair Meidan , Michael Bohadana , Asaf Shabtai , Juan David Guarnizo , Mart\u0131n Ochoa, Nils Ole Tippenhauer, and Yuval Elovici. 2017 . ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis . (2017). Yair Meidan, Michael Bohadana, Asaf Shabtai, Juan David Guarnizo, Mart\u0131n Ochoa, Nils Ole Tippenhauer, and Yuval Elovici. 2017. ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis. (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229598.3229604"},{"key":"e_1_3_2_1_33_1","volume-title":"Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184","author":"Miettinen Markus","year":"2017","unstructured":"Markus Miettinen , Samuel Marchal , Ibbad Hafeez , N Asokan , Ahmad-Reza Sadeghi , and Sasu Tarkoma . 2017 . IoT Sentinel: Automated device-type identification for security enforcement in IoT . In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184 . Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N Asokan, Ahmad-Reza Sadeghi, and Sasu Tarkoma. 2017. IoT Sentinel: Automated device-type identification for security enforcement in IoT. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 2177--2184."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"e_1_3_2_1_35_1","volume-title":"A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249","author":"Nawrocki Marcin","year":"2016","unstructured":"Marcin Nawrocki , Matthias W\u00e4hlisch , Thomas C Schmidt , Christian Keil , and Jochen Sch\u00f6nfelder . 2016. A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249 ( 2016 ). Marcin Nawrocki, Matthias W\u00e4hlisch, Thomas C Schmidt, Christian Keil, and Jochen Sch\u00f6nfelder. 2016. A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249 (2016)."},{"key":"e_1_3_2_1_36_1","volume-title":"Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-scale IoT Exploitations","author":"Neshenko Nataliia","year":"2019","unstructured":"Nataliia Neshenko , Elias Bou-Harb , Jorge Crichigno , Georges Kaddoum , and Nasir Ghani . 2019. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-scale IoT Exploitations . IEEE Communications Surveys & Tutorials ( 2019 ). Nataliia Neshenko, Elias Bou-Harb, Jorge Crichigno, Georges Kaddoum, and Nasir Ghani. 2019. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-scale IoT Exploitations. IEEE Communications Surveys & Tutorials (2019)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"e_1_3_2_1_38_1","unstructured":"INFORMATION MARKETPLACE FOR POLICY and ANALYSIS OF CYBER-RISK & TRUST. 2019. https:\/\/impactcybertrust.org\/. (2019).  INFORMATION MARKETPLACE FOR POLICY and ANALYSIS OF CYBER-RISK & TRUST. 2019. https:\/\/impactcybertrust.org\/. (2019)."},{"key":"e_1_3_2_1_39_1","volume-title":"Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation. In 2018 IEEE International Conference on Communications (ICC). IEEE, 1--7.","author":"Pour Morteza Safaei","year":"2018","unstructured":"Morteza Safaei Pour and Elias Bou-Harb . 2018 . Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation. In 2018 IEEE International Conference on Communications (ICC). IEEE, 1--7. Morteza Safaei Pour and Elias Bou-Harb. 2018. Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation. In 2018 IEEE International Conference on Communications (ICC). IEEE, 1--7."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.014"},{"key":"e_1_3_2_1_41_1","volume-title":"A New CPA Resistant Software Implementation for Symmetric Ciphers with Smoothed Power Consumption: SIMON Case Study. ISeCure 9, 2","author":"Pour Morteza Safaei","year":"2017","unstructured":"Morteza Safaei Pour and Mahmoud Salmasizadeh . 2017. A New CPA Resistant Software Implementation for Symmetric Ciphers with Smoothed Power Consumption: SIMON Case Study. ISeCure 9, 2 ( 2017 ). Morteza Safaei Pour and Mahmoud Salmasizadeh. 2017. A New CPA Resistant Software Implementation for Symmetric Ciphers with Smoothed Power Consumption: SIMON Case Study. ISeCure 9, 2 (2017)."},{"key":"e_1_3_2_1_42_1","unstructured":"Max Pumperla. 2019. https:\/\/github.com\/maxpumperla\/hyperas. (2019).  Max Pumperla. 2019. https:\/\/github.com\/maxpumperla\/hyperas. (2019)."},{"key":"e_1_3_2_1_43_1","volume-title":"Hajime Botnet Friend or Foe? https:\/\/security.radware.com\/ddos-threats-attacks\/hajime-iot-botnet\/. (2018). {Online","year":"2019","unstructured":"radware. 2018. Hajime Botnet Friend or Foe? https:\/\/security.radware.com\/ddos-threats-attacks\/hajime-iot-botnet\/. (2018). {Online ; accessed 01- March - 2019 }. radware. 2018. Hajime Botnet Friend or Foe? https:\/\/security.radware.com\/ddos-threats-attacks\/hajime-iot-botnet\/. (2018). {Online; accessed 01-March-2019}."},{"key":"e_1_3_2_1_44_1","volume-title":"Botnet Muhstik is Actively Exploiting Drupal CVE-2018-7600 in a Worm Style. https:\/\/blog.netlab.360.com\/botnet-muhstik-is-actively-exploiting-drupal-cve-2018-7600-in-a-worm-style-en\/. (2018). {Online","author":"Rootkiter Yegenshen","year":"2019","unstructured":"Yegenshen Rootkiter . 2018. Botnet Muhstik is Actively Exploiting Drupal CVE-2018-7600 in a Worm Style. https:\/\/blog.netlab.360.com\/botnet-muhstik-is-actively-exploiting-drupal-cve-2018-7600-in-a-worm-style-en\/. (2018). {Online ; accessed 01- March - 2019 }. Yegenshen Rootkiter. 2018. Botnet Muhstik is Actively Exploiting Drupal CVE-2018-7600 in a Worm Style. https:\/\/blog.netlab.360.com\/botnet-muhstik-is-actively-exploiting-drupal-cve-2018-7600-in-a-worm-style-en\/. (2018). {Online; accessed 01-March-2019}."},{"key":"e_1_3_2_1_45_1","volume-title":"HNS Botnet Recent Activities. https:\/\/blog.netlab.360.com\/hns-botnet-recent-activities-en\/. (2018). {Online","author":"Rootkiter Yegenshen","year":"2019","unstructured":"Yegenshen Rootkiter . 2018. HNS Botnet Recent Activities. https:\/\/blog.netlab.360.com\/hns-botnet-recent-activities-en\/. (2018). {Online ; accessed 01- March - 2019 }. Yegenshen Rootkiter. 2018. HNS Botnet Recent Activities. https:\/\/blog.netlab.360.com\/hns-botnet-recent-activities-en\/. (2018). {Online; accessed 01-March-2019}."},{"key":"e_1_3_2_1_46_1","volume-title":"Amplification Hell: Revisiting Network Protocols for DDoS Abuse.. In NDSS.","author":"Rossow Christian","year":"2014","unstructured":"Christian Rossow . 2014 . Amplification Hell: Revisiting Network Protocols for DDoS Abuse.. In NDSS. Christian Rossow. 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse.. In NDSS."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.23919\/WAC.2018.8430483"},{"key":"e_1_3_2_1_48_1","unstructured":"Shodan. 2019. The search engine for Internet of things. http:\/\/shodan.io. (2019).  Shodan. 2019. The search engine for Internet of things. http:\/\/shodan.io. (2019)."},{"key":"e_1_3_2_1_49_1","volume-title":"Retrieved (2017)","author":"Team Censys","year":"2017","unstructured":"Censys Team . 2017 . Internet-Wide Scan Data Repository . Retrieved (2017) , 2017. Censys Team. 2017. Internet-Wide Scan Data Repository. Retrieved (2017), 2017."},{"key":"e_1_3_2_1_50_1","volume-title":"The 2010 International Joint Conference on. IEEE, 1--8.","author":"Thai-Nghe Nguyen","year":"2010","unstructured":"Nguyen Thai-Nghe , Zeno Gantner , and Lars Schmidt-Thieme . 2010 . Cost-sensitive learning methods for imbalanced data. In Neural Networks (IJCNN) , The 2010 International Joint Conference on. IEEE, 1--8. Nguyen Thai-Nghe, Zeno Gantner, and Lars Schmidt-Thieme. 2010. Cost-sensitive learning methods for imbalanced data. In Neural Networks (IJCNN), The 2010 International Joint Conference on. IEEE, 1--8."},{"key":"e_1_3_2_1_51_1","volume-title":"Rishi Sairam, Suman Sankar Bhunia, and Mohan Gurusamy.","author":"Thangavelu Vijayanand","year":"2018","unstructured":"Vijayanand Thangavelu , Dinil Mon Divakaran , Rishi Sairam, Suman Sankar Bhunia, and Mohan Gurusamy. 2018 . DEFT : A Distributed IoT Fingerprinting Technique. IEEE Internet of Things Journal ( 2018). Vijayanand Thangavelu, Dinil Mon Divakaran, Rishi Sairam, Suman Sankar Bhunia, and Mohan Gurusamy. 2018. DEFT: A Distributed IoT Fingerprinting Technique. IEEE Internet of Things Journal (2018)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00064"},{"key":"e_1_3_2_1_54_1","volume-title":"Techniques for detecting compromised IoT devices","author":"der Elzen Ivo Van","unstructured":"Ivo Van der Elzen and Jeroen van Heugten . 2017. Techniques for detecting compromised IoT devices . University of Amsterdam (2017) . Ivo Van der Elzen and Jeroen van Heugten. 2017. Techniques for detecting compromised IoT devices. University of Amsterdam (2017)."},{"key":"e_1_3_2_1_55_1","unstructured":"xmrminer. 2019. Monero Web Miner. https:\/\/xmrminer.cc\/. (2019).  xmrminer. 2019. Monero Web Miner. https:\/\/xmrminer.cc\/. (2019)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-015-0040-1"},{"key":"e_1_3_2_1_57_1","unstructured":"ZoomEye. 2019. http:\/\/www.zoomeye.org\/. (2019).  ZoomEye. 2019. http:\/\/www.zoomeye.org\/. (2019)."}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":55,"alternative-id":["10.1145\/3339252.3339272","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339272","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}