{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:27:56Z","timestamp":1736486876497,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_1","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"1-17","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Detection of Local Scanners"],"prefix":"10.1007","author":[{"given":"Ahren","family":"Studer","sequence":"first","affiliation":[]},{"given":"Chenxi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D.: A network security monitor. In: Proc. IEEE Symposium on Research in Security and Privacy, pp. 296\u2013304 (1990)","DOI":"10.1109\/RISP.1990.63859"},{"key":"1_CR2","unstructured":"Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th USENIX Security Symposium (2004)"},{"key":"1_CR3","unstructured":"Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proceedings of the 13th Conference on Computer and Communication Security (LISA 1999), pp. 229\u2013238 (1999)"},{"issue":"23-24","key":"1_CR4","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks\u00a031(23-24), 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Jung, J., Paxon, V., Berger, A.W., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of 2004 IEEE Symposium on Security and Privacy (2004)","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-540-30143-1_4","volume-title":"Recent Advances in Intrusion Detection","author":"S.E. Schechter","year":"2004","unstructured":"Schechter, S.E., Jung, J., Berger, A.W.: Fast Detection of Scanning Worm Infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 59\u201381. Springer, Heidelberg (2004)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Ganesh, A., Gunawardena, D., Key, P., Massoulie, L., Scott, J.: Efficient quarantining of scanning worms: Optimal detection and coordination. In: Proceedings of IEEE INFOCOM 2006 (2006)","DOI":"10.1109\/INFOCOM.2006.97"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Williamson, M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada (2002)","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Chen, S., Tang, Y.: Slowing down internet worms. In: Proceedings of 24th International Conference on Distributed Computing Systems, Tokyo, Japan (2004)","DOI":"10.1109\/ICDCS.2004.1281596"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/11663812_2","volume-title":"Recent Advances in Intrusion Detection","author":"C. Wong","year":"2006","unstructured":"Wong, C., Bielski, S., Studer, A., Wang, C.-X.: Empirical Analysis of Rate Limiting Mechanisms. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 22\u201342. Springer, Heidelberg (2006)"},{"key":"1_CR11","unstructured":"Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6th ACM\/USENIX Symposium on Operating System Design and Implementation (2004)"},{"key":"1_CR12","unstructured":"Kim, H., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the 13th USENIX Security Symposium, San Diego, California, USA (2004)"},{"key":"1_CR13","unstructured":"Newsome, J., Karp, B., Song, D.: Polygraph: Automatic signature generation for polymorphic worms. In: Proc. IEEE Symposium on Research in Security and Privacy (2005)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Studer, A., Wang, C.: Fast detection of local scanners using adaptive thresholds. Technical Report CMU-Cylab-06-004, Carnegie Mellon University (2006)","DOI":"10.1007\/11767480_1"},{"key":"1_CR15","unstructured":"Symantec: W32.Blaster.Worm (2003), http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.blaster.worm.html"},{"key":"1_CR16","unstructured":"Symantec: W32.Welchia.Worm (2003), http:\/\/securityresponse.symantec.com\/avcenter\/venc\/data\/w32.welchia.worm.html"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T18:24:53Z","timestamp":1736447093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11767480_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}