{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:22:44Z","timestamp":1725560564748},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540281023"},{"type":"electronic","value":"9783540318682"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11534310_47","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T09:48:30Z","timestamp":1127814510000},"page":"433-442","source":"Crossref","is-referenced-by-count":1,"title":["Improved Thumbprint and Its Application for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Jianhua","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shou-Hsuan Stephen","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"DIDS (Distributed Intrusion Detection System)-Motivation, Architecture, and Early Prototype. In: Snapp, S. (ed.) Proceedings of 14th National Computer Security Conference, October 1991, pp. 167\u2013176 (1991)"},{"key":"47_CR2","unstructured":"Caller Identification System in the Internet Environment. In: Jung, H. (ed.) Proceedings of 4th USENIX Security Symposium, pp. 17\u201332 (1993)"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Staniford-Chen, S., Heberlein, L.T.: Holding Intruders Accountable on the Internet. In: Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA, May 1995, pp. 39\u201349 (1995)","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"47_CR4","unstructured":"Zhang, Y., Paxson, V.: Detecting stepping-stone. In: Proceedings of the 9th USENIX Security Symposium, Denver, CO, pp. 67\u201381 (2000)"},{"key":"47_CR5","series-title":"Lecture Notes in Computer Science","first-page":"31","volume-title":"Proceedings of the 6th European Symposium on Research in Computer Security, Toulouse, France","author":"K. Yoda","year":"2000","unstructured":"Yoda, K., Etoh, H.: Finding Connection Chain for Tracing Intruders. In: Proceedings of the 6th European Symposium on Research in Computer Security, Toulouse, France, October 2000. LNCS, vol.\u00a01985, pp. 31\u201342. Springer, Heidelberg (2000)"},{"key":"47_CR6","unstructured":"Yang, J., Huang, S.-H.S.: Correlating Temporal Thumbprints for Tracing Intruders. To appear in Proceedings of 3rd International Conference on Computing, Communications and Control Technologies (CCCT 2005), Austin, TX (July 2005)"},{"key":"47_CR7","unstructured":"Yang, J., Huang, S.-H.S.: Matching TCP Packets and Its Application to the Detection of Long Connection Chains. In: Proceedings (IEEE) of 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, China, March 2005, pp. 1005\u20131010 (2005)"},{"key":"47_CR8","unstructured":"Ylonen, T.: SSH\u2014Secure Login Connections Over the Internet. In: 6th USENIX Security Symposium, San Jose, CA, USA, pp. 37\u201342 (1996)"},{"key":"47_CR9","unstructured":"University of Southern California: Transmission Control Protocol. RFC 793 (September 1981)"},{"key":"47_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/047086804X","volume-title":"Data Networks, IP and the Internet Protocols, Design and Operation","author":"M.P. Clark","year":"2003","unstructured":"Clark, M.P.: Data Networks, IP and the Internet Protocols, Design and Operation. Wiley, New York (2003)"},{"key":"47_CR11","unstructured":"Ylonen, T.: SSH Transport Layer Protocol, draft IETF document, \n                    \n                      http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-secsh-transport-18.txt\n                    \n                    \n                   (accessed June 2004)"},{"key":"47_CR12","unstructured":"Ylonen, T.: SSH Protocol Architecture, draft IETF document, \n                    \n                      http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-secsh-architecture-16.txt\n                    \n                    \n                   (accessed June 2004)"},{"key":"47_CR13","unstructured":"Lawrence Berkeley National Laboratory (LBNL): The Packet Capture library, \n                    \n                      ftp:\/\/ftp.ee.lbl.gov\/libpcap.tar.z\n                    \n                    \n                   (accessed March 2004)"}],"container-title":["Lecture Notes in Computer Science","Networking and Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11534310_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:51:42Z","timestamp":1619491902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11534310_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281023","9783540318682"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11534310_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}