{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:17Z","timestamp":1750308437345,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372984","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Isolating P2P Botnet Using EigenTrust Algorithm in P2P File Sharing Networks"],"prefix":"10.1145","author":[{"given":"Mohamed Amine","family":"Rguibi","sequence":"first","affiliation":[{"name":"LAROSERI, Department of Computer Science, University of Chouaib Doukkali, EL Jadida, Morocco"}]},{"given":"Najem","family":"Moussa","sequence":"additional","affiliation":[{"name":"LAROSERI, Department of Computer Science, University of Chouaib Doukkali, EL Jadida, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2564-5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0310-0"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/catch.2009.40"},{"key":"e_1_3_2_1_4_1","unstructured":"NSFOCUS Company. 2018. 2018 Botnet Trend Report. https:\/\/nsfocusglobal.com\/2018-botnet-trend-report\/  NSFOCUS Company. 2018. 2018 Botnet Trend Report. https:\/\/nsfocusglobal.com\/2018-botnet-trend-report\/"},{"key":"e_1_3_2_1_5_1","first-page":"6","article-title":"The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets","volume":"5","author":"Cooke Evan","year":"2005","unstructured":"Evan Cooke , Farnam Jahanian , and Danny McPherson . 2005 . The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets . SRUTI 5 (2005), 6 -- 6 . Evan Cooke, Farnam Jahanian, and Danny McPherson. 2005. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. SRUTI 5 (2005), 6--6.","journal-title":"SRUTI"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.44"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/securware.2009.48"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/510726.510756"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0150-x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.C1300242"},{"key":"e_1_3_2_1_12_1","first-page":"305","article-title":"Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network","volume":"9","author":"Obeidat Atef Ahmed","year":"2017","unstructured":"Atef Ahmed Obeidat . 2017 . Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network . International Journal of Communication Networks and Information Security 9 , 3 (2017), 305 -- 313 . Atef Ahmed Obeidat. 2017. Hybrid Approach for Botnet Detection Using K-Means and K-Medoids with Hopfield Neural Network. International Journal of Communication Networks and Information Security 9, 3 (2017), 305--313.","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings First International Conference on Peer-to-Peer Computing. IEEE, IEEE Comput. Soc, 99--100","author":"Ripeanu M.","year":"2001","unstructured":"M. Ripeanu . 2001 . Peer-to-peer architecture case study: Gnutella network . In Proceedings First International Conference on Peer-to-Peer Computing. IEEE, IEEE Comput. Soc, 99--100 . https:\/\/doi.org\/10.1109\/p2p.2001.990433 10.1109\/p2p.2001.990433 M. Ripeanu. 2001. Peer-to-peer architecture case study: Gnutella network. In Proceedings First International Conference on Peer-to-Peer Computing. IEEE, IEEE Comput. Soc, 99--100. https:\/\/doi.org\/10.1109\/p2p.2001.990433"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749442"},{"key":"e_1_3_2_1_16_1","volume-title":"BotCluster: A session-based P2P botnet clustering system on NetFlow. Computer Networks 145 (nov","author":"Wang Chun-Yu","year":"2018","unstructured":"Chun-Yu Wang , Chi-Lung Ou , Yu-En Zhang , Feng-Min Cho , Pin-Hao Chen , Jyh-Biau Chang , and Ce-Kuen Shieh . 2018. BotCluster: A session-based P2P botnet clustering system on NetFlow. Computer Networks 145 (nov 2018 ), 175--189. https:\/\/doi.org\/10.1016\/j.comnet.2018.08.014 10.1016\/j.comnet.2018.08.014 Chun-Yu Wang, Chi-Lung Ou, Yu-En Zhang, Feng-Min Cho, Pin-Hao Chen, Jyh-Biau Chang, and Ce-Kuen Shieh. 2018. BotCluster: A session-based P2P botnet clustering system on NetFlow. Computer Networks 145 (nov 2018), 175--189. https:\/\/doi.org\/10.1016\/j.comnet.2018.08.014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TDSC.2008.35","article-title":"An Advanced Hybrid Peer-to-Peer Botnet","volume":"7","author":"Wang Ping","year":"2010","unstructured":"Ping Wang , Sherri Sparks , and Cliff C Zou . 2010 . An Advanced Hybrid Peer-to-Peer Botnet . IEEE Transactions on Dependable and Secure Computing 7 , 2 (apr 2010), 113--127. https:\/\/doi.org\/10.1109\/tdsc.2008.35 10.1109\/tdsc.2008.35 Ping Wang, Sherri Sparks, and Cliff C Zou. 2010. An Advanced Hybrid Peer-to-Peer Botnet. IEEE Transactions on Dependable and Secure Computing 7, 2 (apr 2010), 113--127. https:\/\/doi.org\/10.1109\/tdsc.2008.35","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_11"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372984","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":19,"alternative-id":["10.1145\/3372938.3372984","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372984","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}