{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:16:10Z","timestamp":1725549370141},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540926658"},{"type":"electronic","value":"9783540926665"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-540-92666-5_15","type":"book-chapter","created":{"date-parts":[[2010,3,8]],"date-time":"2010-03-08T10:24:44Z","timestamp":1268043884000},"page":"179-190","source":"Crossref","is-referenced-by-count":2,"title":["Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Limmer","sequence":"first","affiliation":[]},{"given":"Falko","family":"Dressler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Carle, G., Dressler, F., Kemmerer, R.A., K\u00f6nig, H., Kruegel, C., Laskov, P.: Manifesto \u2014 Perspectives Workshop: Network Attack Detection and Defense. In: Dagstuhl Perspectives Workshop 08102 \u2014 Network Attack Detection and Defense 2008, Schloss Dagstuhl, Wadern, Germany (March 2008)"},{"key":"15_CR2","first-page":"62","volume-title":"IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)","author":"R.T. Lampert","year":"2006","unstructured":"Lampert, R.T., Sommer, C., M\u00fcnz, G., Dressler, F.: Vermont \u2014 A Versatile Monitoring Toolkit Using IPFIX\/PSAMP. In: IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006), T\u00fcbingen, Germany, IEEE (September 2006) 62\u201365"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Claise, B.: Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information. RFC 5101, IETF (January 2008)","DOI":"10.17487\/rfc5101"},{"key":"15_CR4","unstructured":"Kobayashi, A., Nishida, H., Sommer, C., Dressler, F., Stephan, E., Claise, B.: IPFIX Mediation: Problem Statement. Internet-Draft (work in progress) draftietf-ipfix-mediators-problem-statement-00.txt, IETF (May 2008)"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/863955.863972","volume-title":"ACM SIGCOMM 2003","author":"C. Estan","year":"2003","unstructured":"Estan, C., Savage, S., Varghese, G.: Automatically Inferring Patterns of Resource Consumption in Network Traffic. In: ACM SIGCOMM 2003, Karlsruhe, Germany, ACM (August 2003) 137\u2013148"},{"key":"15_CR6","unstructured":"Jung, J., Paxson, V., Berger, A.W., lakrishnan, H.B.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: IEEE Symposium on Security and Privacy, Berkeley\/Oakland, CA (May 2004)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Bernaille, L., Teixeira, R.: Early Application Identification. In: 2nd International Conference On Emerging Networking Experiments And Technologies (CoNext 2006), Lisboa, Portugal (December 2006)","DOI":"10.1145\/1368436.1368445"},{"issue":"1","key":"15_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1198255.1198257","volume":"37","author":"M. Crotti","year":"2007","unstructured":"Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic Classification Through Simple Statistical Fingerprinting. ACM Computer Communication Review (CCR) 37(1) (January 2007) 5\u201316","journal-title":"ACM Computer Communication Review (CCR)"},{"key":"15_CR9","unstructured":"Wagner, A., D\u00fcbendorfer, T., H\u00e4mmerle, L., Plattner, B.: Identifying P2P Heavy-Hitters from Network-Flow Data. In: 2nd CERT Workshop on Flow Analysis (FloCon 2005), Pittsburgh, Pennsylvania (September 2005)"},{"key":"15_CR10","unstructured":"Rajab, M.A., Monrose, F., Terzis, A.: On the Effectiveness of Distributed Worm Monitoring. In: 14th USENIX Security Symposium, Baltimore, MD (July 2005)"}],"container-title":["Informatik aktuell","Kommunikation in Verteilten Systemen (KiVS)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92666-5_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:13:15Z","timestamp":1606183995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92666-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540926658","9783540926665"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92666-5_15","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[2009]]}}}