{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:35Z","timestamp":1726037735532},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_34","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"362-374","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Steady-State Topology Discovery of Target Networks Based on Statistics Method"],"prefix":"10.1007","author":[{"given":"Di","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1109\/COMST.2014.2376520","volume":"17","author":"R Motamedi","year":"2014","unstructured":"Motamedi, R., Rejaie, R., Willinger, W.: A survey of techniques for internet topology discovery. IEEE Commun. Surv. Tutorials 17, 1044\u20131065 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"4","key":"34_CR2","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/90.944338","volume":"9","author":"S. Floyd","year":"2001","unstructured":"Floyd, S., Paxson, V.: Difficulties in simulating the Internet (2001)","journal-title":"IEEE\/ACM Transactions on Networking"},{"doi-asserted-by":"crossref","unstructured":"Claffy, K., Luckie, M., Dhamdhere, A., et al.: Bdrmap: inference of borders between IP networks. In: ACM on Internet Measurement Conference, pp. 381\u2013396 (2016)","key":"34_CR3","DOI":"10.1145\/2987443.2987467"},{"issue":"4","key":"34_CR4","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/COMST.2007.4444750","volume":"9","author":"Benoit Donnet","year":"2007","unstructured":"Donnet, B., Friedman, T.: Internet topology discovery: a survey (2007)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"5","key":"34_CR5","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1096536.1096546","volume":"35","author":"Y Shavitt","year":"2005","unstructured":"Shavitt, Y., Shir, E.: DIMES: let the internet measure itself. ACM SIGCOMM Comput. Commun. Rev. 35(5), 71\u201374 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Beverly, R., Berger, A., Xie, G.G.: Primitives for active internet topology mapping: toward high-frequency characterization. In: ACM SIGCOMM Conference on Internet Measurement, pp. 165\u2013171 (2010)","key":"34_CR6","DOI":"10.1145\/1879141.1879162"},{"unstructured":"\u201cTraceroute\u201d: ftp:\/\/ftp.ee.lbl.gov\/traceroute.tar.gz","key":"34_CR7"},{"unstructured":"Toren, M.C.: Tcptraceroute: an implementation of traceroute using TCP SYN packets. Man page (2001). http:\/\/michael.toren.net\/code\/tcptraceroute\/","key":"34_CR8"},{"unstructured":"Surhone, L.M., Tennoe, M.T., Henssonow, S.F., et al.: TCP\/IP Model (2010)","key":"34_CR9"},{"issue":"2","key":"34_CR10","doi-asserted-by":"crossref","first-page":"205","DOI":"10.32604\/cmc.2018.03726","volume":"57","author":"W Yang","year":"2018","unstructured":"Yang, W., Dong, P., et al.: A MPTCP scheduler for web transfer. CMC: Comput. Mater. Continua 57(2), 205\u2013222 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"3","key":"34_CR11","first-page":"433","volume":"56","author":"J Wang","year":"2018","unstructured":"Wang, J., Ju, C., et al.: A PSO based energy efficient coverage control algorithm for wireless sensor networks. CMC: Comput. Mater. Continua 56(3), 433\u2013446 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"doi-asserted-by":"crossref","unstructured":"Gharaibeh, M., Shah, A., Huffaker, B., et al.: A look at router geolocation in public and commercial databases. In: Internet Measurement Conference, pp 463\u2013469 (2017)","key":"34_CR12","DOI":"10.1145\/3131365.3131380"},{"issue":"3","key":"34_CR13","first-page":"333","volume":"46","author":"D Komosn\u00fd","year":"2017","unstructured":"Komosn\u00fd, D., Voz\u0148\u00e1k, M., Rehman, S.U., et al.: Location accuracy of commercial IP address geolocation databases. Inf. Technol. Control 46(3), 333\u2013344 (2017)","journal-title":"Inf. Technol. Control"},{"issue":"8","key":"34_CR14","first-page":"4","volume":"29","author":"G Wang","year":"2007","unstructured":"Wang, G., et al.: Topology discovery of backbone network based on multi-message combination. Comput. Eng. Sci. 29(8), 4\u20136 (2007)","journal-title":"Comput. Eng. Sci."},{"doi-asserted-by":"crossref","unstructured":"Liu, S., Liu, F., Zhao, F., et al.: IP city-level geolocation based on the PoP-level network topology analysis. In: International Conference on Information Communication and Management, pp 109\u2013114. IEEE (2016)","key":"34_CR15","DOI":"10.1109\/INFOCOMAN.2016.7784225"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:24:53Z","timestamp":1695032693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}