{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:06Z","timestamp":1750308426336,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T00:00:00Z","timestamp":1621468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Vingroup Innovation Foundation (VINIF), Vingroup Big Data Institute (VINBIGDATA)","award":["VINIF.2020.TS.40"],"award-info":[{"award-number":["VINIF.2020.TS.40"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,20]]},"DOI":"10.1145\/3468691.3468714","type":"proceedings-article","created":{"date-parts":[[2021,8,7]],"date-time":"2021-08-07T12:01:52Z","timestamp":1628337712000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Toward an approach using graph-theoretic for IoT botnet detection"],"prefix":"10.1145","author":[{"given":"Quoc-Dung","family":"Ngo","sequence":"first","affiliation":[{"name":"Posts and Telecommunications Institute of Technology, Vietnam"}]},{"given":"Huy-Trung","family":"Nguyen","sequence":"additional","affiliation":[{"name":"People's Security Academy, Vietnam"}]},{"given":"Hoang-Anh","family":"Tran","sequence":"additional","affiliation":[{"name":"People's Security Academy, Vietnam"}]},{"given":"Ngoc-Anh","family":"Pham","sequence":"additional","affiliation":[{"name":"People's Security Academy, Vietnam"}]},{"given":"Xuan-Hoang","family":"Dang","sequence":"additional","affiliation":[{"name":"People's Security Academy, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2021,8,7]]},"reference":[{"unstructured":"Rich Campagna \u201c8 Most Common Attack Vectors [Online]. Available at: https:\/\/securityboulevard.com\/2020\/06\/8-most-common-attack-vectors\/.\u201d .  Rich Campagna \u201c8 Most Common Attack Vectors [Online]. Available at: https:\/\/securityboulevard.com\/2020\/06\/8-most-common-attack-vectors\/.\u201d .","key":"e_1_3_2_1_1_1"},{"unstructured":"Smriti Srivastava \u201cBotnet attacks: severity protection and most dangerous invasions in past years. [Online]. Available at: https:\/\/www.analyticsinsight.net\/botnet-attacks-severity-protection-and-most-dangerous-invasions-in-past-years\/.\u201d .  Smriti Srivastava \u201cBotnet attacks: severity protection and most dangerous invasions in past years. [Online]. Available at: https:\/\/www.analyticsinsight.net\/botnet-attacks-severity-protection-and-most-dangerous-invasions-in-past-years\/.\u201d .","key":"e_1_3_2_1_2_1"},{"unstructured":"\u201c\u2018Internet of Things\u2019 connected devices to triple by 2021 reaching over 46 billion units [Online]. Available at: https:\/\/www.juniperresearch.com\/press\/press-releases\/\u2019internet-of-things\u2019-connected-devices-triple-2021.\u201d .  \u201c\u2018Internet of Things\u2019 connected devices to triple by 2021 reaching over 46 billion units [Online]. Available at: https:\/\/www.juniperresearch.com\/press\/press-releases\/\u2019internet-of-things\u2019-connected-devices-triple-2021.\u201d .","key":"e_1_3_2_1_3_1"},{"volume-title":"Alladi T, Chamola V, Sikdar B, Choo KK. Consumer IoT: Security vulnerability case studies and solutions","year":"2020","key":"e_1_3_2_1_4_1"},{"unstructured":"\u201c2020 Unit 42 IoT Threat Report [Online]. Available at: https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/.\u201d  \u201c2020 Unit 42 IoT Threat Report [Online]. Available at: https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/.\u201d","key":"e_1_3_2_1_5_1"},{"unstructured":"\u201cSymantec 2015. Mirai: what you need to know about the botnet behind recent major DdoS attacks [Online]. Available at: https:\/\/www.symantec.com\/connect\/blogs\/mirai-what-you-need-know-about-botnet-behind-recent-major-ddos-attacks Symantec Official Blog.\u201d  \u201cSymantec 2015. Mirai: what you need to know about the botnet behind recent major DdoS attacks [Online]. Available at: https:\/\/www.symantec.com\/connect\/blogs\/mirai-what-you-need-know-about-botnet-behind-recent-major-ddos-attacks Symantec Official Blog.\u201d","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/MC.2017.201"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.icte.2020.04.005"},{"volume-title":"Proceedings of the ACM Conference on Computer and Communications Security, CCS","year":"2009","first-page":"620","key":"e_1_3_2_1_9_1"},{"volume-title":"Detecting malware variants via function-call graph similarity","year":"2010","first-page":"120","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/11790754_8"},{"doi-asserted-by":"crossref","unstructured":"\u201cBai J Shi Q Mu S. A Malware and Variant Detection Method Using Function Call Graph Isomorphism. Security and Communication Networks. 2019 Sep 22;2019.\u201d .  \u201cBai J Shi Q Mu S. A Malware and Variant Detection Method Using Function Call Graph Isomorphism. Security and Communication Networks. 2019 Sep 22;2019.\u201d .","key":"e_1_3_2_1_12_1","DOI":"10.1155\/2019\/1043794"},{"doi-asserted-by":"crossref","unstructured":"\u201cNiu W Cao R Zhang X Ding K Zhang K Li T. OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning. Sensors. 2020 Jan;20(13):3645.\u201d .  \u201cNiu W Cao R Zhang X Ding K Zhang K Li T. OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning. Sensors. 2020 Jan;20(13):3645.\u201d .","key":"e_1_3_2_1_13_1","DOI":"10.3390\/s20133645"},{"doi-asserted-by":"crossref","unstructured":"\u201cRunwal N Low RM Stamp M. Opcode graph similarity and metamorphic detection. Journal in computer virology. 2012 May 1;8(1-2):37-52.\u201d .  \u201cRunwal N Low RM Stamp M. Opcode graph similarity and metamorphic detection. Journal in computer virology. 2012 May 1;8(1-2):37-52.\u201d .","key":"e_1_3_2_1_14_1","DOI":"10.1007\/s11416-012-0160-5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/JIOT.2019.2925929"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/s10207-019-00475-6"},{"volume-title":"Workshop on Offensive Technologies ({WOOT} 15)","author":"Pa Pa Yin Minn","key":"e_1_3_2_1_17_1"},{"unstructured":"\u201cVirusShare Because Sharing is Caring.\u201d [Online]. Available at: https:\/\/virusshare.com.  \u201cVirusShare Because Sharing is Caring.\u201d [Online]. Available at: https:\/\/virusshare.com.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","first-page":"101861","article-title":"SINGH, Jagsir; SINGH, Jaswinder. A survey on machine learning-based malware detection in executable files","year":"2020","journal-title":"Journal of Systems Architecture"},{"volume-title":"C. E. Rasmusssen and C. K. I. Williams, Gaussian Processes for Machine Learning","year":"2006","key":"e_1_3_2_1_20_1"},{"unstructured":"\u201cScikit-learn Machine learning in Python [Online]. Available at: https:\/\/scikit-learn.org\/stable\/.\u201d  \u201cScikit-learn Machine learning in Python [Online]. Available at: https:\/\/scikit-learn.org\/stable\/.\u201d","key":"e_1_3_2_1_21_1"},{"unstructured":"\u201cKlambauer G\u00fcnter Thomas Unterthiner Andreas Mayr and Sepp Hochreiter. \u2018Self-normalizing neural networks.\u2019 Advances in neural information processing systems 30 (2017): 971-980.\u201d  \u201cKlambauer G\u00fcnter Thomas Unterthiner Andreas Mayr and Sepp Hochreiter. \u2018Self-normalizing neural networks.\u2019 Advances in neural information processing systems 30 (2017): 971-980.\u201d","key":"e_1_3_2_1_22_1"}],"event":{"acronym":"CNIOT2021","name":"CNIOT2021: 2021 2nd International Conference on Computing, Networks and Internet of Things","location":"Beijing China"},"container-title":["2021 2nd International Conference on Computing, Networks and Internet of Things (CNIOT 2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468691.3468714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468691.3468714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:35Z","timestamp":1750268975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468691.3468714"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,20]]},"references-count":22,"alternative-id":["10.1145\/3468691.3468714","10.1145\/3468691"],"URL":"https:\/\/doi.org\/10.1145\/3468691.3468714","relation":{},"subject":[],"published":{"date-parts":[[2021,5,20]]}}}