{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:03:29Z","timestamp":1746331409865,"version":"3.40.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_2","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:55:03Z","timestamp":1402419303000},"page":"11-22","source":"Crossref","is-referenced-by-count":9,"title":["A Network Telescope for Early Warning Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Panos","family":"Chatziadam","sequence":"first","affiliation":[]},{"given":"Ioannis G.","family":"Askoxylakis","sequence":"additional","affiliation":[]},{"given":"Alexandros","family":"Fragkiadakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Irwin, B.: A framework for the application of network telescope sensors in a global IP network (January 2011)"},{"key":"2_CR2","unstructured":"Pouget, F., Dacier, M., Pham, V.: Vh: Leurre.com: on the advantages of deploying a large scale distributed honeypot platform. In: ECCE 2005, E-Crime and Computer Evidence, pp. 1\u201313 (2005)"},{"key":"2_CR3","unstructured":"Final Report - NoAH (NoAH: a European Network of Affined Honeypots) (2008)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.cose.2013.03.014","volume":"38","author":"T. Spyridopoulos","year":"2013","unstructured":"Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defence framework against DoS\/DDoS cyber attacks. Computers & Security\u00a038, 39\u201350 (2013)","journal-title":"Computers & Security"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Cooke, E., Bailey, M., Watson, D., Jahanian, F., Nazario, J.: The Internet motion sensor: A distributed global scoped Internet threat monitoring system, 1\u201316 (2004)","DOI":"10.1145\/1330107.1330135"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K.: User centric security model for tamper-resistant devices. In: Proceedings - 2011 8th IEEE International Conference on e-Business Engineering, ICEBE 2011, pp. 168\u2013177 (2011)","DOI":"10.1109\/ICEBE.2011.69"},{"key":"2_CR7","unstructured":"Raspberry Pi, http:\/\/www.raspberry.org"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Myrick, A., Sinha, S.: Practical Darknet Measurement. In: 40th Annual Conference on Information Sciences and Systems (2006)","DOI":"10.1109\/CISS.2006.286376"},{"key":"2_CR9","unstructured":"PostgreSQL, http:\/\/www.postgresql.org"},{"key":"2_CR10","unstructured":"Maxmind, http:\/\/www.maxmind.com"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Moore, D., Shannon, C., Brown, D.: Inferring internet denial-of-service activity. ACM Transactions (2006)","DOI":"10.1145\/1132026.1132027"},{"issue":"10","key":"2_CR12","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1093\/comjnl\/bxr035","volume":"54","author":"M.H. Bhuyan","year":"2011","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Surveying Port Scans and Their Detection Methodologies. The Computer Journal\u00a054(10), 1565\u20131581 (2011)","journal-title":"The Computer Journal"},{"key":"2_CR13","unstructured":"Akram, R., Markantonakis, K. (n.d.): Smart Cards: State-of-the-Art to Future Directions. crow.org.nz"},{"key":"2_CR14","unstructured":"Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: Understanding, detecting, and disrupting botnets. In: USENIX SRUTI Workshop (2005)"},{"key":"2_CR15","unstructured":"Symantec, W32.downadup, http:\/\/www.symantec.com"},{"key":"2_CR16","unstructured":"Cisco, Branch router QoS design, http:\/\/www.cisco.com"},{"key":"2_CR17","unstructured":"Internet file system, http:\/\/www.snia.org"},{"key":"2_CR18","unstructured":"Computer Emergency Response Team of Austria, cert.at"},{"key":"2_CR19","unstructured":"Oxford University, The Darknet Mesh Project, projects.oucs.ox.ac.uk"},{"key":"2_CR20","unstructured":"Caida, The UCSD Network Telescope, http:\/\/www.caida.org\/projects\/network_telescope\/"},{"key":"2_CR21","unstructured":"ICSI, CCIED Network Telescope, http:\/\/www.icir.org\/vern\/telescope.html"},{"key":"2_CR22","unstructured":"Team Cymru, The Darknet Project, http:\/\/www.team-cymru.org"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Fragkiadakis, A.G., Tragos, E.Z., Tryfonas, T., Askoxylakis, I.G.: Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype. EURASIP Journal on Wireless Communications and Networking\u00a0(1), 73 (2012)","DOI":"10.1186\/1687-1499-2012-73"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:06:20Z","timestamp":1746263180000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}