{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T17:00:36Z","timestamp":1742403636145},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258094"},{"type":"electronic","value":"9783540320173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11422778_59","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:01:28Z","timestamp":1279051288000},"page":"730-742","source":"Crossref","is-referenced-by-count":8,"title":["PISA: Automatic Extraction of Traffic Signatures"],"prefix":"10.1007","author":[{"given":"Parminder","family":"Chhabra","sequence":"first","affiliation":[]},{"given":"Ajita","family":"John","sequence":"additional","affiliation":[]},{"given":"Huzur","family":"Saran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","unstructured":"CERT, Vulnerabilities, Incidents and Fixes, \n                    \n                      http:\/\/www.cert.org\/nav\/index_red.html"},{"key":"59_CR2","volume-title":"Pattern Classification and Scene Analysis","author":"R.O. Duda","year":"1973","unstructured":"Duda, R.O., Hard, P.E.: Pattern Classification and Scene Analysis. Wiley-Interscience, NY (1973)"},{"key":"59_CR3","doi-asserted-by":"crossref","unstructured":"Estan, C., Savage, S., Varghese, G.: Automatically Inferring Patterns of Resource Consumption in Network Traffic. In: Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany (August 2003)","DOI":"10.1145\/863955.863972"},{"key":"59_CR4","unstructured":"Jagadish, H.V., Madar, J., Ng, R.T.: Semantic Compression and Pattern Extraction with Fascicles. In: Proceedings of 25th VLDB, pp. 186\u2013198 (1999)"},{"key":"59_CR5","volume-title":"Algorithms for Clustering Data","author":"A.K. Jain","year":"1988","unstructured":"Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice Hall, New Jersey (1988)"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic. In: ACM Conference on Computer and Communications Security (CCS 2003) (October 2003)","DOI":"10.1145\/948109.948116"},{"key":"59_CR7","unstructured":"Dittrich, D.: Distributed Denial of Service Attacks\/Tools, \n                    \n                      http:\/\/staff.washington.edu\/dittrich\/"},{"key":"59_CR8","unstructured":"Kim, H.-A., Karp, B.: Autograph: Toward Automated, Distributed Worm Signature Detection. In: Proceedings of the 13th Usenix Security Symposium (Security 2004), San Diego, CA (August 2004)"},{"issue":"3","key":"59_CR9","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/571697.571724","volume":"32","author":"R. Mahajan","year":"2002","unstructured":"Mahajan, R., Bellovin, S.M., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling High Bandwidth Aggregates in the Network. Computer Communications Review\u00a032(3), 62\u201373 (2002)","journal-title":"Computer Communications Review"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Mannila, H., Toivonen, H.: Level_Wise search and borders of theories in knowledge discovery. Data Mining and Knowledge Discovery\u00a01(3), 241\u2013258","DOI":"10.1023\/A:1009796218281"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial of Service Activity. In: Proceedings of the 2001 USENIX Security Symposium, Washington, D.C. (August 2001)","DOI":"10.21236\/ADA400003"},{"key":"59_CR12","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated Worm Fingerprinting. In: Proceedings of the 6th ACM\/USENIX OSDI Symposium, San Francisco, CA (December 2004)"},{"key":"59_CR13","unstructured":"MAWI Working Group, Packet traces from WIDE backbone, \n                    \n                      http:\/\/tracer.csl.sony.co.jp\/mawi\/"},{"key":"59_CR14","unstructured":"UCSD Network Telescope Backscatter Datasets for February 2001, CAIDA, \n                    \n                      http:\/\/www.caida.org\/analysis\/security\/telescope\/"},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Chhabra, P., et al.: XCHOKe: Malicious Source Control for Congestion Avoidance at Internet Gateways. In: Proceedings of 10th IEEE ICNP (2002)","DOI":"10.1109\/ICNP.2002.1181399"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11422778_59.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:04:28Z","timestamp":1619507068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11422778_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258094","9783540320173"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11422778_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}