{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:03Z","timestamp":1755974403018,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T00:00:00Z","timestamp":1716336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,22]]},"DOI":"10.1145\/3658549.3658552","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T19:14:16Z","timestamp":1719947656000},"page":"12-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparison of Interaction Profiling Bipartite Graph Mining and Graph Neural Network for Malware-Control Domain Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8212-5151","authenticated-orcid":false,"given":"Tzung-Han","family":"Jeng","sequence":"first","affiliation":[{"name":"Information &amp; Communications Security Laboratory, Chunghwa Telecommunication Laboratories, Taiwan and \rDepartment of Information Management, National Central University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0019-1164","authenticated-orcid":false,"given":"Chien-Chih","family":"Chen","sequence":"additional","affiliation":[{"name":"Information &amp; Communications Security Laboratory, Chunghwa Telecommunication Laboratories, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6189-2646","authenticated-orcid":false,"given":"Yu-Lung","family":"Tsai","sequence":"additional","affiliation":[{"name":"Information &amp; Communications Security Laboratory, Chunghwa Telecommunication Laboratories, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2981-6700","authenticated-orcid":false,"given":"Yi-Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Central University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2021 Data Breach Investigations Report","author":"Business Verizon","year":"2021","unstructured":"Verizon Business, \u201c2021 Data Breach Investigations Report,\u201d 2021, https:\/\/www.verizon.com\/business\/resources\/reports\/dbir."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857546.2857614"},{"key":"e_1_3_2_1_4_1","volume-title":"Periodic Connections to Control Server Offer New Way to Detect Botnets","author":"Shah C.","year":"2013","unstructured":"C. Shah, \u201cPeriodic Connections to Control Server Offer New Way to Detect Botnets,\u201d October 2013, https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/periodic-links-to-control-server-offer-new-way-to-detect-botnets."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2377295"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8841544"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.021"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2693418"},{"key":"e_1_3_2_1_10_1","volume-title":"Graph-based Deep Learning for Communication Networks: A Survey","author":"Jiang W.","year":"2021","unstructured":"W. Jiang, \u201cGraph-based Deep Learning for Communication Networks: A Survey,\u201d June 2021, https:\/\/arxiv.org\/abs\/2106.02533."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR\u201919)","author":"Veli\u010dkovi\u0107 P.","year":"2019","unstructured":"P. Veli\u010dkovi\u0107, W. Fedus, W. L. Hamilton, P. Li\u00f2, Y. Bengio, and R. D. Hjelm, \u201cDeep graph infomax,\u201d in Proceedings of the International Conference on Learning Representations (ICLR\u201919), May 2019."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"e_1_3_2_1_13_1","first-page":"118","volume-title":"Proceedings of the 18th An USENIX Security Symposium (SSYM\u201909)","author":"Hao S.","year":"2009","unstructured":"S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser, \u201cDetecting spammers with SNARE: spatio-temporal network-level automatic reputation engine,\u201d in Proceedings of the 18th An USENIX Security Symposium (SSYM\u201909), pp. 101\u2013118, Montreal, Canada, August 2009."}],"event":{"name":"I-DO '24: International Conference on Information Technology, Data Science, and Optimization","acronym":"I-DO '24","location":"Taipei Taiwan"},"container-title":["Proceedings of the 2024 International Conference on Information Technology, Data Science, and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658549.3658552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658549.3658552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:15:03Z","timestamp":1755972903000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658549.3658552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,22]]},"references-count":13,"alternative-id":["10.1145\/3658549.3658552","10.1145\/3658549"],"URL":"https:\/\/doi.org\/10.1145\/3658549.3658552","relation":{},"subject":[],"published":{"date-parts":[[2024,5,22]]},"assertion":[{"value":"2024-07-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}