{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:13:52Z","timestamp":1773249232232,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.23919\/cycon.2019.8756814","type":"proceedings-article","created":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T00:18:45Z","timestamp":1562890725000},"page":"1-19","source":"Crossref","is-referenced-by-count":13,"title":["Machine Learnin\u0123-based Detection of C&amp;C Channels with a Focus on the Locked Shields Cyber Defense Exercise"],"prefix":"10.23919","author":[{"given":"Nicolas","family":"Kanzig","sequence":"first","affiliation":[]},{"given":"Roland","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Gambazzi","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Lenders","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Vanbever","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"Cobalt Strike Reporting"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref12","year":"0","journal-title":"The Bro Network Security Monitor"},{"key":"ref13","year":"0","journal-title":"CICFLOWMETER A network traffic Biflow generator and analyzer"},{"key":"ref14","article-title":"Understanding variable importances in forests of randomized trees","author":"louppe","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref15","year":"0","journal-title":"sklearn RandomForestClassifier"},{"key":"ref16","year":"0","journal-title":"Cobalt Strike 3 11 Manual"},{"key":"ref17","year":"0","journal-title":"Scikit-learn Machine Learning in Python"},{"key":"ref18","year":"2018","journal-title":"Learning Dexterous in-Hand Manipulation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3163058.3163059"},{"key":"ref3","year":"0","journal-title":"Locked Shields 2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420969"},{"key":"ref7","article-title":"Detecting Malware Domains at the Upper DNS Hierarchy","author":"antonakakis","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref2","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"USENIX Security Symposium"},{"key":"ref1","year":"0","journal-title":"How a British SMB survived a nightmarish cryptolocker ransom attack | Security | Computerworld UK"},{"key":"ref9","year":"2018","journal-title":"CCDCOE News"}],"event":{"name":"2019 11th International Conference on Cyber Conflict (CyCon)","location":"Tallinn, Estonia","start":{"date-parts":[[2019,5,28]]},"end":{"date-parts":[[2019,5,31]]}},"container-title":["2019 11th International Conference on Cyber Conflict (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8751947\/8756633\/08756814.pdf?arnumber=8756814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T22:32:21Z","timestamp":1599517941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8756814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/cycon.2019.8756814","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}