{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:28Z","timestamp":1750220848480,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T00:00:00Z","timestamp":1571270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,17]]},"DOI":"10.1145\/3358331.3358380","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Co-Clustering Host-Domain Graphs to Discover Malware Infection"],"prefix":"10.1145","author":[{"given":"Xin","family":"Xie","sequence":"first","affiliation":[{"name":"College of Computer Science and Engineering, UESTC, Chengdu China"}]},{"given":"Weina","family":"Niu","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu China"}]},{"given":"XiaoSong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, UESTC, Chengdu China"}]},{"given":"Zhongwei","family":"Ren","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, UESTC, Chengdu China"}]},{"given":"Yuheng","family":"Luo","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, UESTC, Chengdu China"}]},{"given":"Jiangchao","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, UESTC, Chengdu China"}]}],"member":"320","published-online":{"date-parts":[[2019,10,17]]},"reference":[{"volume-title":"Advanced persistent threat (APT) beyond the hype. Project Report in IMT4582 Network Security at Gjovik University College","author":"Ask M.","key":"e_1_3_2_1_1_1","unstructured":"M. Ask , P. Bondarenko , J. E. Rekdal , A. Nordbo , P. Bloemerus , D. Piatkivskyi , Advanced persistent threat (APT) beyond the hype. Project Report in IMT4582 Network Security at Gjovik University College , Springer . M. Ask, P. Bondarenko, J. E. Rekdal, A. Nordbo, P. Bloemerus, D. Piatkivskyi, Advanced persistent threat (APT) beyond the hype. Project Report in IMT4582 Network Security at Gjovik University College, Springer."},{"volume-title":"Targeted cyberattacks: a superset of advanced persistent threats","author":"Sood A. K.","key":"e_1_3_2_1_2_1","unstructured":"A. K. Sood , R. J. Enbody . Targeted cyberattacks: a superset of advanced persistent threats . IEEE security & privacy 11(1): 54--61. A. K. Sood, R. J. Enbody. Targeted cyberattacks: a superset of advanced persistent threats. IEEE security & privacy 11(1): 54--61."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003816"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171592.3171595"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2458581"},{"key":"e_1_3_2_1_7_1","volume-title":"Identifying apt malware domain based on mobile dns logging. Mathematical Problems in Engineering","author":"Niu W.","year":"2017","unstructured":"W. Niu , X. Zhang , G. Yang , J. Zhu , Z. Ren ( 2017 ). Identifying apt malware domain based on mobile dns logging. Mathematical Problems in Engineering . W. Niu, X. Zhang, G. Yang, J. Zhu, Z. Ren (2017). Identifying apt malware domain based on mobile dns logging. Mathematical Problems in Engineering."},{"volume-title":"Security in wireless sensor networks","author":"Du X.","key":"e_1_3_2_1_8_1","unstructured":"X. Du , H.-H. Chen , Security in wireless sensor networks , IEEE Wireless Communications 15 (4). X. Du, H.-H. Chen, Security in wireless sensor networks, IEEE Wireless Communications 15 (4)."},{"key":"e_1_3_2_1_9_1","volume-title":"Computer communications 30 (11--12), 2314--2341.","author":"Xiao Y.","year":"2007","unstructured":"Y. Xiao , V. K. Rayi , B. Sun , X. Du , F. Hu , M. Galloway ( 2007 ). A survey of key management schemes in wireless sensor networks , Computer communications 30 (11--12), 2314--2341. Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, M. Galloway (2007). A survey of key management schemes in wireless sensor networks, Computer communications 30 (11--12), 2314--2341."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.060598"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.05.012"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003816"},{"volume-title":"Proceedings of the 27th annual computer security applications conference. ACM, 21--30","author":"Comparetti P. M.","key":"e_1_3_2_1_13_1","unstructured":"Neugschwandtner, P. M. Comparetti , C. Platzer , Detecting malware's failover c&c strategies with squeeze (2011) . in: Proceedings of the 27th annual computer security applications conference. ACM, 21--30 . Neugschwandtner, P. M. Comparetti, C. Platzer, Detecting malware's failover c&c strategies with squeeze (2011). in: Proceedings of the 27th annual computer security applications conference. ACM, 21--30."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.018"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579359"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.11.001"},{"issue":"3","key":"e_1_3_2_1_18_1","first-page":"116","article-title":"Dga-based botnet detection using dns traffic","volume":"3","author":"Zhou Y.","year":"2013","unstructured":"Y. Zhou , Q. Li , Q. Miao , K. Yim ( 2013 ). Dga-based botnet detection using dns traffic , J. Internet Serv. Inf. Secur. , 3 ( 3\/4 ), 116 -- 123 . Y. Zhou, Q. Li, Q. Miao, K. Yim (2013). Dga-based botnet detection using dns traffic, J. Internet Serv. Inf. Secur., 3(3\/4), 116--123.","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX security symposium, 273--290.","author":"Perdisci R.","year":"2010","unstructured":". Antomakakis, R. Perdisci , D. Dagon , W. Lee , N. Feamster ( 2010 ). Building a dynamic reputation system for dns , in: USENIX security symposium, 273--290. . Antomakakis, R. Perdisci, D. Dagon, W. Lee, N. Feamster (2010). Building a dynamic reputation system for dns, in: USENIX security symposium, 273--290."},{"key":"e_1_3_2_1_20_1","volume-title":"Ndss.","author":"Bilge L.","year":"2011","unstructured":"L. Bilge , E. Kirda , C. Kruegel , M. Balduzzi ( 2011 ). Exposure: Finding malicious domains using passive dns analysis , in: Ndss. L. Bilge, E. Kirda, C. Kruegel, M. Balduzzi (2011). Exposure: Finding malicious domains using passive dns analysis, in: Ndss."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762763"},{"issue":"10","key":"e_1_3_2_1_22_1","first-page":"102687","article-title":"Detecting malware based on dns graph mining","volume":"11","author":"Zou F.","year":"2015","unstructured":"F. Zou , S. Zhang , W. Rao , P. Yi ( 2015 ). Detecting malware based on dns graph mining , International Journal of Distributed Sensor Networks 11 ( 10 ), 102687 . F. Zou, S. Zhang, W. Rao, P. Yi (2015). Detecting malware based on dns graph mining, International Journal of Distributed Sensor Networks 11(10), 102687.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.02.009"},{"key":"e_1_3_2_1_24_1","unstructured":"P. Camelo J. Moura L. Krippahl. Condenser: A graph-based approachfor detecting botnets arXiv preprint arXiv:1410. 8747  P. Camelo J. Moura L. Krippahl. Condenser: A graph-based approachfor detecting botnets arXiv preprint arXiv:1410. 8747"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666652.2666659"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897877"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.35"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.38"}],"event":{"name":"AIAM 2019: 2019 International Conference on Artificial Intelligence and Advanced Manufacturing","acronym":"AIAM 2019","location":"Dublin Ireland"},"container-title":["Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358331.3358380","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358331.3358380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:08Z","timestamp":1750202588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358331.3358380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,17]]},"references-count":29,"alternative-id":["10.1145\/3358331.3358380","10.1145\/3358331"],"URL":"https:\/\/doi.org\/10.1145\/3358331.3358380","relation":{},"subject":[],"published":{"date-parts":[[2019,10,17]]},"assertion":[{"value":"2019-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}