{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:57:11Z","timestamp":1725541031167},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642012150"},{"type":"electronic","value":"9783642012167"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01216-7_75","type":"book-chapter","created":{"date-parts":[[2009,11,18]],"date-time":"2009-11-18T20:32:19Z","timestamp":1258576339000},"page":"701-709","source":"Crossref","is-referenced-by-count":5,"title":["Monitoring ARP Attack Using Responding Time and State ARP Cache"],"prefix":"10.1007","author":[{"given":"Zhenqi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"75_CR1","first-page":"566","volume":"23","author":"W. Guo","year":"2002","unstructured":"Guo, W., Liu, X.: Monitoring Method of MiM Attack Based on Timeout of ARP Cache. Computer Engineering\u00a023, 566\u2013571 (2002)","journal-title":"Computer Engineering"},{"key":"75_CR2","first-page":"403","volume":"29","author":"X. Ren","year":"2003","unstructured":"Ren, X.: The Principle Agreement to Deceive the Analysis and Methods to Resist. Computer Engineer\u00a029, 403\u2013440 (2003)","journal-title":"Computer Engineer"},{"key":"75_CR3","unstructured":"Arpwatch, \n                    \n                      ftp:\/\/ftp.ee.lbl.gov\/arpwatch.tar.gz"},{"key":"75_CR4","first-page":"26","volume":"56","author":"T. Demuth","year":"2005","unstructured":"Demuth, T., Leitner, A.: Arp Spoofing and Poisoning. TrafficTricks Linux Magazine\u00a056, 26\u201331 (2005)","journal-title":"TrafficTricks Linux Magazine"},{"key":"75_CR5","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S1389-1286(02)00326-2","volume":"41","author":"M. Gouda","year":"2003","unstructured":"Gouda, M., Huang, C.-T.: A Secure Address Resolution Protocol. Computer Networks\u00a041, 57\u201371 (2003)","journal-title":"Computer Networks"}],"container-title":["Advances in Soft Computing","The Sixth International Symposium on Neural Networks (ISNN 2009)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01216-7_75.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:59:29Z","timestamp":1619776769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01216-7_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642012150","9783642012167"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01216-7_75","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}