{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:35:02Z","timestamp":1725543302867},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_2","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"18-32","source":"Crossref","is-referenced-by-count":1,"title":["Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Jianhua","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yongzhong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Base, R.: A New Look at Perpetrators of Computer Crime. In: Proceeding of 16th Department of Energy Computer Security Group Conference, Denver, CO (May 1994)","key":"2_CR1"},{"unstructured":"Power, R.: Current and Future Danger. Computer Security Institute, San Francisco (1995)","key":"2_CR2"},{"unstructured":"CERT: CERT\/CC Statistics 1988-2005 (accessed July 2005), \n                    \n                      http:\/\/www.cert.org","key":"2_CR3"},{"unstructured":"Zhang, Y., Paxson, V.: Detecting Stepping-Stones. In: Proceedings of the 9th USENIX Security Symposium, Denver, CO, pp. 67\u201381 (August 2000)","key":"2_CR4"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36084-0_1","volume-title":"Recent Advances in Intrusion Detection","author":"K.H. Yung","year":"2002","unstructured":"Yung, K.H.: Detecting Long Connection Chains of Interactive Terminal Sessions. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol.\u00a02516, pp. 1\u201316. Springer, Heidelberg (2002)"},{"unstructured":"Yang, J., Huang, S.-H.S.: Matching TCP Packets and Its Application to the Detection of Long Connection Chains. In: Proceedings (IEEE) of 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Taipei, Taiwan, China, pp. 1005\u20131010 (March 2005)","key":"2_CR6"},{"unstructured":"University of Southern California: Transmission Control Protocol. RFC 793 (September 1981)","key":"2_CR7"},{"unstructured":"Ylonen, T.: SSH Protocol Architecture. Draft IETF document (June 2004), \n                    \n                      http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-secsh-architecture-16.txt","key":"2_CR8"},{"unstructured":"Ylonen, T.: SSH Transport Layer Protocol. Draft IETF document (June 2004), \n                    \n                      http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-secsh-transport-18.txt","key":"2_CR9"},{"unstructured":"Li, Q., Mills, D.L.: On the Long-range Dependence of Packet Round-trip Delays in Internet. In: Proceedings of International Conference on Communications (ICC 1998), Atlanta, USA, pp. 1185\u20131192 (1998)","key":"2_CR10"},{"key":"2_CR11","first-page":"47","volume-title":"An Introduction to Stochastic Processes","author":"E. Kao","year":"1996","unstructured":"Kao, E.: An Introduction to Stochastic Processes, pp. 47\u201387. Duxbury Press, New York (1996)"},{"key":"2_CR12","first-page":"212","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1968","unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications, vol.\u00a01, pp. 212\u2013237. John Wiley & Sons, Inc., New York (1968)"},{"unstructured":"Lawrence Berkeley National Laboratory (LBNL): The Packet Capture library (accessed March 2004), \n                    \n                      ftp:\/\/ftp.ee.lbl.gov\/libpcap.tar.z","key":"2_CR13"},{"unstructured":"Data Nerds Web Site: Winpcap and Windump (accessed July 2004), \n                    \n                      http:\/\/www.datanerds.net","key":"2_CR14"},{"doi-asserted-by":"crossref","unstructured":"Donoho, D.L. (ed.): Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. In: Proceedings of International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, pp. 45\u201359 (September 2002)","key":"2_CR15","DOI":"10.1007\/3-540-36084-0_2"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-30143-1_14","volume-title":"Recent Advances in Intrusion Detection","author":"A. Blum","year":"2004","unstructured":"Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 258\u2013277. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Reeves, D.S.: Robust Correlation of Encrypted Attack Traffic Through Stepping-Stones by Manipulation of Interpacket Delays. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington DC (October 2003)","key":"2_CR17","DOI":"10.1145\/948109.948115"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","first-page":"31","volume-title":"Proc. 6th European Symposium on Research in Computer Security","author":"K. Yoda","year":"2000","unstructured":"Yoda, K., Etoh, H.: Finding Connection Chain for Tracing Intruders. In: Proc. 6th European Symposium on Research in Computer Security. LNCS, vol.\u00a01985, pp. 31\u201342. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Staniford-Chen, S., Todd Heberlein, L.: Holding Intruders Accountable on the Internet. In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA, pp. 39\u201349 (August 1995)","key":"2_CR19","DOI":"10.1109\/SECPRI.1995.398921"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T02:33:02Z","timestamp":1552357982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11767480_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}