{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:53:44Z","timestamp":1729608824290,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/inm.2017.7987293","type":"proceedings-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T16:32:03Z","timestamp":1500913923000},"page":"308-316","source":"Crossref","is-referenced-by-count":9,"title":["Learning behavioral fingerprints from Netflows using Timed Automata"],"prefix":"10.23919","author":[{"given":"Gaetano","family":"Pellegrino","sequence":"first","affiliation":[]},{"given":"Qin","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hammerschmidt","sequence":"additional","affiliation":[]},{"given":"Sicco","family":"Verwer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1006\/nimg.1998.0391"},{"key":"ref38","first-page":"1","article-title":"Results of the abbadingo one dfa learning competition and a new evidence-driven state merging algorithm","author":"lang","year":"1998","journal-title":"ICGI"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139194655"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)90683-6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)90562-4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139194655"},{"journal-title":"Efficient Identification of Timed Automata Theory and Practice","year":"2010","author":"verwer","key":"ref36"},{"key":"ref35","first-page":"3","article-title":"Real-time automata","volume":"6","author":"dima","year":"2001","journal-title":"Journal of Automata Languages and Combinatorics"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653737"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089126"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-008-0086-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866355"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68768-1_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15488-1_17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420969"},{"key":"ref19","first-page":"565","article-title":"Botwatcher: Transparent and generic botnet tracking","author":"barabosch","year":"2015","journal-title":"Research in Attacks Intrusions and Defenses 18th InternationalSymposium RAID 2015 Kyoto Japan November 2-4 2015 Proceedings"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/5.533956"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.17"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.jnca.2012.12.020","article-title":"Review: A survey of network flow applications","volume":"36","author":"li","year":"2013","journal-title":"J Netw Comput Appl"},{"key":"ref6","first-page":"43","article-title":"An algorithm for anomaly-based botnet detection","author":"binkley","year":"2006","journal-title":"USENIX SRUTI worskhop"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/287000.287001"},{"key":"ref5","first-page":"1384","article-title":"Defending against internet worms: A signature-based approach","volume":"2","author":"tang","year":"2005","journal-title":"IEEE INFOCOM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19419-6_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.018"},{"key":"ref2","first-page":"967","article-title":"Botnet researchsurvey","author":"zhu","year":"2008","journal-title":"IEEE COMPSAC"},{"key":"ref9","first-page":"177","article-title":"Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware","author":"chen","year":"2008","journal-title":"DSN"},{"key":"ref1","first-page":"139","article-title":"Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Usenix Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-012-0149-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.49"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381904"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_1"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/978-3-319-11212-1_25","author":"nagaraja","year":"2014","journal-title":"Computer Security-ESORICS 2014 19th European Symposium on Research in Computer Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366308"}],"event":{"name":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","start":{"date-parts":[[2017,5,8]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7976714\/7987228\/07987293.pdf?arnumber=7987293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T10:38:17Z","timestamp":1569926297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7987293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":39,"URL":"https:\/\/doi.org\/10.23919\/inm.2017.7987293","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}