{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T18:44:13Z","timestamp":1768070653085,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540000204","type":"print"},{"value":"9783540360841","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36084-0_2","type":"book-chapter","created":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T21:40:00Z","timestamp":1179265200000},"page":"17-35","source":"Crossref","is-referenced-by-count":97,"title":["Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay"],"prefix":"10.1007","author":[{"given":"David L.","family":"Donoho","sequence":"first","affiliation":[]},{"given":"Ana Georgina","family":"Flesia","sequence":"additional","affiliation":[]},{"given":"Umesh","family":"Shankar","sequence":"additional","affiliation":[]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Coit","sequence":"additional","affiliation":[]},{"given":"Stuart","family":"Staniford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-6283-9","volume-title":"Probability Approximations Via the Poisson Clumping Heuristic","author":"D.L. Aldous","year":"1989","unstructured":"Aldous, D.L.: Probability Approximations Via the Poisson Clumping Heuristic. Springer-Verlag, New York. January 1989"},{"key":"2_CR2","volume-title":"Extremes and related properties of stationary sequences and processes","author":"G. Lindgren","year":"1983","unstructured":"Lindgren, G., Leadbetter, M.R., and Rootzen, H.: Extremes and related properties of stationary sequences and processes. Springer, New York (1983). Russian translation; Nauka: Moscow (1988)."},{"key":"2_CR3","unstructured":"Shimomura, T. and Markoff, J.: Takedown. The pursuit and capture of Kevin Mit-nick, America\u2019s most wanted computer outlaw-by the man who did it. Hyperion. December 1995."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Mallat, S.: A Wavelet Tour of Signal Processing. Academic Press. Second Edition, 2000.","DOI":"10.1016\/B978-012466606-1\/50008-8"},{"key":"2_CR5","unstructured":"Meyer, Y.:Wavelets: Algorithms and Applications. SIAM. May 1993"},{"key":"2_CR6","unstructured":"Stoll, C.: The Cuckoo\u2019s Egg: Tracking a Spy through the Maze of Computer Espionage. Pocket Books. October 2000"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Staniford-Chen, S. and Heberlein, L.: Holding Intruders Accountable on the Internet. Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, CA (1995)","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"2_CR8","unstructured":"Zhang, Y. and Paxson, V.: Detecting stepping stones. Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, August 2000. http:\/\/www.aciri.org\/vern\/papers\/stepping-sec00.ps.gz"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Paxson, V. and Floyd, S.: Wide-Area Traffic: The Failure of Poisson Modeling. IEEE\/ACM Transactions on Networking, Vol. 3(3), June 1995, 226\u2013244","DOI":"10.1109\/90.392383"},{"key":"2_CR10","unstructured":"Wavelab Toolbox for Wavelet Analysis. Requires Matlab. http:\/\/www-stat. stanford. edu\/ wavelab"},{"key":"2_CR11","series-title":"Lect Notes Comput Sci","volume-title":"6th European Symposium on Research in Computer Security-ESORICS 2000","author":"K. Yoda","year":"2000","unstructured":"Yoda, K. and Etoh, H.: Finding a Connection Chain for Tracing Intruders, In: Guppens, F., Deswarte, Y., Gollamann, D. and Waidner, M. (eds): 6th European Symposium on Research in Computer Security-ESORICS 2000 LNCS-1985, Toulouse, France, Oct 2000"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36084-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T20:51:36Z","timestamp":1556398296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36084-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000204","9783540360841"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-36084-0_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}