{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:21:30Z","timestamp":1759335690289},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_4","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:42:01Z","timestamp":1187163721000},"page":"31-40","source":"Crossref","is-referenced-by-count":5,"title":["Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology"],"prefix":"10.1007","author":[{"given":"Yang-Seo","family":"Choi","sequence":"first","affiliation":[]},{"given":"Dong-il","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Sung-Won","family":"Sohn","sequence":"additional","affiliation":[]},{"given":"Sang-Ho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"unstructured":"CERT, http:\/\/www.cert.org","key":"4_CR1"},{"unstructured":"Buchholz, Thomas E. Daniels, Benjamin Kuperman, Clay Shields, \u201cPacket Tracker Final Report\u201d, CERIAS Technical Report 2000\u201323, Purdue University, 2000","key":"4_CR2"},{"doi-asserted-by":"crossref","unstructured":"Chaeho Lim, \u201cSemi-Auto Intruder Retracing Using Autonomous Intrusion Analysis Agent\u201d, FIRST Conference on Computer Security Incident Handling & Response 1999, 1999","key":"4_CR3","DOI":"10.1016\/S1353-4858(00)80005-7"},{"doi-asserted-by":"crossref","unstructured":"X. Wang, D. Reeves, S. F. Wu, and J. Yuill, \u201cSleepy Watermark Tracing: An active Network-Based Intrusion Response Framework\u201d, Proceedings of IFIP Conference on Security, Mar. 2001","key":"4_CR4","DOI":"10.1007\/0-306-46998-7_26"},{"unstructured":"H. T. Jung et al. \u201cCaller Identification System in the Internet Environment.\u201d, In Proceedings of the 4th Usenix Security Symposium, 1993.","key":"4_CR5"},{"unstructured":"Heejin Jang and Sangwook Kim, \u201cA Self Extension Monitoring for Security Management\u201d, 16th Annual Computer Security Applications Conference Dec. 2000.","key":"4_CR6"},{"doi-asserted-by":"crossref","unstructured":"S. Staniford-Chen and L. T. Heberlein. \u201cHolding Intruders Accountable on the Internet\u201d. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995.","key":"4_CR7","DOI":"10.1109\/SECPRI.1995.398921"},{"unstructured":"Y. Zhang and V. Paxson, \u201cDetecting Stepping Stones\u201d, Proceedings of 9th USENIX Security Symposium, August 2000.","key":"4_CR8"},{"doi-asserted-by":"crossref","unstructured":"K. Yoda and H. Etoh, \u201cFinding a Connection Chain for Tracing Intruders\u201d, In F. Guppens, Y. Deswarte, D. Gollamann, and M. Waidner, editors, 6th European Symposium on Research in Computer Security-ESORICS 2000 LNCS-1985, Toulouse, France, Oct 2000.","key":"4_CR9","DOI":"10.1007\/10722599_12"},{"unstructured":"S. Snapp et al. \u201cDIDS (Distributed Intrusion Detection System)-Motivation, Architecture, and An Early Prototype.\u201d In Proceedings of the 14th National Computer Security Conference, 1991.","key":"4_CR10"},{"doi-asserted-by":"crossref","unstructured":"D. Wetherall, J. Guttag and D. Tennenhouse. ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. In Proceedings of IEEE OPENARCH\u2019 1998, April 1998.","key":"4_CR11","DOI":"10.1109\/OPNARC.1998.662048"},{"unstructured":"Dawn X. Song and Adrian Perrig, \u201cAdvanced and Authenticated Marking Schemes for IP Traceback\u201d, Proceedings of InfoCom 2001","key":"4_CR12"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T02:14:19Z","timestamp":1556763259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}