{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:21:52Z","timestamp":1725790912244},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,27]],"date-time":"2019-07-27T00:00:00Z","timestamp":1564185600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7,27]]},"DOI":"10.1145\/3348445.3348474","type":"proceedings-article","created":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T12:14:07Z","timestamp":1568636047000},"page":"247-251","source":"Crossref","is-referenced-by-count":8,"title":["Towards a rooted subgraph classifier for IoT botnet detection"],"prefix":"10.1145","author":[{"given":"Huy-Trung","family":"Nguyen","sequence":"first","affiliation":[{"name":"Graduate University of Science and Technology, VAST, Hanoi, Vietnam"}]},{"given":"Doan-Hieu","family":"Nguyen","sequence":"additional","affiliation":[{"name":"People's Security Academy Vietnam, Hanoi, Vietnam"}]},{"given":"Quoc-Dung","family":"Ngo","sequence":"additional","affiliation":[{"name":"Posts and Telecommunications Institute of Technology"}]},{"given":"Vu-Hai","family":"Tran","sequence":"additional","affiliation":[{"name":"Posts and Telecommunications Institute of Technology"}]},{"given":"Van-Hoang","family":"Le","sequence":"additional","affiliation":[{"name":"AIS jsc"}]}],"member":"320","published-online":{"date-parts":[[2019,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Acarali Dilara etal 2019. Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Security and Communication Networks Hindawi. (2019) 1--13. Acarali Dilara et al. 2019. Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Security and Communication Networks Hindawi. (2019) 1--13.","DOI":"10.1155\/2019\/3745619"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Detecting crypto-ransomware in IoT networks based on energy consumption footprint","author":"Azmoodeh Amin","year":"2017","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Amin Azmoodeh etal 2018. Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning. IEEE Transactions on Sustainable Computing (2018) 88--95. Amin Azmoodeh et al. 2018. Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning. IEEE Transactions on Sustainable Computing (2018) 88--95.","DOI":"10.1109\/TSUSC.2018.2809665"},{"key":"e_1_3_2_1_4_1","unstructured":"Annamalai Narayanan Mahinthan Chandramohan Lihui Chen Yang Liu and Santhoshkumar Saminathan 2016. subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs. arXiv preprint arXiv:1606.08928 (2016). Annamalai Narayanan Mahinthan Chandramohan Lihui Chen Yang Liu and Santhoshkumar Saminathan 2016. subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs. arXiv preprint arXiv:1606.08928 (2016)."},{"volume-title":"Understanding Linux Malware. IEEE Symposium on Security and Privacy","year":"2018","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Homayoun Sajad etal 2018. BoTShark: A deep learning approach for botnet traffic detection. Cyber Threat Intelligence (2018) 137--153. Homayoun Sajad et al. 2018. BoTShark: A deep learning approach for botnet traffic detection. Cyber Threat Intelligence (2018) 137--153.","DOI":"10.1007\/978-3-319-73951-9_7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSP.2018.8549713"},{"key":"e_1_3_2_1_8_1","unstructured":"Jingjing Lu et al. 2017. Research of timing graph traversal algorithm in static timing analysis based on FPGA. 3rd Information Technology and Mechatronics Engineering (2017) 334--338. Jingjing Lu et al. 2017. Research of timing graph traversal algorithm in static timing analysis based on FPGA. 3rd Information Technology and Mechatronics Engineering (2017) 334--338."},{"key":"e_1_3_2_1_9_1","unstructured":"Kishore Angrishi 2017. Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets. arXiv preprint arXiv:1702.03681 (2017). Kishore Angrishi 2017. Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets. arXiv preprint arXiv:1702.03681 (2017)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Liu Liu etal 2017. Automatic malware classification and new malware detection using machine learning. Frontiers of Information Technology & Electronic Engineering Zhejiang University Press. 18 9 (2017) 1336--1347. Liu Liu et al. 2017. Automatic malware classification and new malware detection using machine learning. Frontiers of Information Technology & Electronic Engineering Zhejiang University Press. 18 9 (2017) 1336--1347.","DOI":"10.1631\/FITEE.1601325"},{"key":"e_1_3_2_1_11_1","unstructured":"Mikhail Kuzin Yaroslav Shmelev Vladimir Kuskov 2017. \"New trends in the world of IoT threats \" Available at: https:\/\/securelist.com\/new-trends-in-the-world-of-iot-threats\/87991\/ (Accessed 29 November 2018). Mikhail Kuzin Yaroslav Shmelev Vladimir Kuskov 2017. \"New trends in the world of IoT threats \" Available at: https:\/\/securelist.com\/new-trends-in-the-world-of-iot-threats\/87991\/ (Accessed 29 November 2018)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2468-4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Mohannad Alhanahnah Qicheng Lin and Qiben Yan 2018. Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. Communications and Network Security (2018) 1--9. Mohannad Alhanahnah Qicheng Lin and Qiben Yan 2018. Efficient Signature Generation for Classifying Cross-Architecture IoT Malware. Communications and Network Security (2018) 1--9.","DOI":"10.1109\/CNS.2018.8433203"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Muhamed Fauzi Bin Abbas and Thambipillai Srikanthan 2017. Low-Complexity Signature-Based Malware Detection for IoT Devices. Communications in Computer and Information Science (Jul. 2017) 181--189. Muhamed Fauzi Bin Abbas and Thambipillai Srikanthan 2017. Low-Complexity Signature-Based Malware Detection for IoT Devices. Communications in Computer and Information Science (Jul. 2017) 181--189.","DOI":"10.1007\/978-981-10-5421-1_15"},{"volume-title":"IoTPOT: A Novel Honenypot for Revealing Current IoT Threats. Journal in Information Processing. 24","year":"2016","author":"Suzuki Y.M.P.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Product Brief 2014. Intel Gateway Solutions for the Internet of Things. Product Brief 2014. Intel Gateway Solutions for the Internet of Things."},{"volume-title":"Proceedings of the 31 st International Conference on Machine Learning","year":"2014","author":"Le Quoc","key":"e_1_3_2_1_17_1"},{"volume-title":"IoDDoS - The Internet of Distributed Denial of Sevice Attacks. 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017","year":"2017","author":"Hallman Roger","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884439"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0074-7"},{"volume-title":"26th International Conference on Neural Information Processing Systems","year":"2013","author":"Mikolov Tomas","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"https:\/\/www.virustotal.com {Accessed at 5\/02\/2019}. https:\/\/www.virustotal.com {Accessed at 5\/02\/2019}."},{"key":"e_1_3_2_1_24_1","unstructured":"VirusShare Because Sharing is Caring - https:\/\/virusshare.com\/ {Accessed at 10\/01\/2019}. VirusShare Because Sharing is Caring - https:\/\/virusshare.com\/ {Accessed at 10\/01\/2019}."}],"event":{"name":"ICCCM 2019: The 7th International Conference on Computer and Communications Management","sponsor":["Chongqing University of Posts and Telecommunications"],"location":"Bangkok Thailand","acronym":"ICCCM 2019"},"container-title":["Proceedings of the 2019 7th International Conference on Computer and Communications Management"],"original-title":[],"link":[{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3348474&ftid=2084058&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T08:34:10Z","timestamp":1585643650000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3348445.3348474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,27]]},"references-count":24,"alternative-id":["10.1145\/3348445.3348474","10.1145\/3348445"],"URL":"https:\/\/doi.org\/10.1145\/3348445.3348474","relation":{},"subject":[],"published":{"date-parts":[[2019,7,27]]}}}