{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:33:15Z","timestamp":1725532395423},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642013980"},{"type":"electronic","value":"9783642013997"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01399-7_48","type":"book-chapter","created":{"date-parts":[[2009,5,6]],"date-time":"2009-05-06T05:18:41Z","timestamp":1241587121000},"page":"614-625","source":"Crossref","is-referenced-by-count":2,"title":["Scan Surveillance in Internet Networks"],"prefix":"10.1007","author":[{"given":"Khadija","family":"Ramah Houerbi","sequence":"first","affiliation":[]},{"given":"Kav\u00e9","family":"Salamatian","sequence":"additional","affiliation":[]},{"given":"Farouk","family":"Kamoun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Jung, J., Paxson, V., Berger, A., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: IEEE Symposium on Security and Privacy, pp. 211\u2013225 (2004)","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Allman, M., Paxson, V., Terrell, J.: A Brief History of Scanning. In: ACM SIGCOMM\/USENIX Internet Measurement Conference (October 2007)","DOI":"10.1145\/1298306.1298316"},{"key":"48_CR3","first-page":"27","volume-title":"4th ACM SIGCOMM IMC conference","author":"R. Pang","year":"2004","unstructured":"Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L.: Characteristics of internet background radiation. In: 4th ACM SIGCOMM IMC conference, pp. 27\u201340. ACM, New York (2004)"},{"key":"48_CR4","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1145\/781027.781045","volume-title":"ACM SIGMETRICS","author":"V. Yegneswaran","year":"2003","unstructured":"Yegneswaran, V., Barford, P., Ullrich, J.: Internet intrusions: global characteristics and prevalence. In: ACM SIGMETRICS, pp. 138\u2013147. ACM, New York (2003)"},{"key":"48_CR5","first-page":"2435","volume-title":"7th conference on USENIX Security Symposium","author":"V. Paxson","year":"1998","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. In: 7th conference on USENIX Security Symposium, pp. 2435\u20132463. USENIX Association, Berkeley (1998)"},{"key":"48_CR6","unstructured":"Roesch, M.: Snort\u2013Lightweight Intrusion Detection for Networks. In: 13th Conference on Systems Administration LISA 1999, pp. 229\u2013238 (1999)"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Simon, G., Xiong, H., Eilertson, E., Kumar, V.: Scan Detection: A Data Mining Approach. In: Proceedings of the Sixth SIAM International Conference on Data Mining, pp. 118\u2013129 (2006)","DOI":"10.1137\/1.9781611972764.11"},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"Leckie, C., Kotagiri, R.: A probabilistic approach to detecting network scans. In: Network Operations and Management Symposium, NOMS 2002. 2002 IEEE\/IFIP, pp. 359\u2013372 (2002)","DOI":"10.1109\/NOMS.2002.1015594"},{"key":"48_CR9","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/1080091.1080118","volume-title":"SIGCOMM conference","author":"A. Lakhina","year":"2005","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: SIGCOMM conference, pp. 217\u2013228. ACM, New York (2005)"},{"key":"48_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-540-73614-1_10","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M. Kang","year":"2007","unstructured":"Kang, M., Caballero, J., Song, D.: Distributed Evasive Scan Techniques and Countermeasures. In: H\u00e4mmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol.\u00a04579, pp. 157\u2013174. Springer, Heidelberg (2007)"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Wagner, A., Plattner, B.: Entropy based worm and anomaly detection in fast IP networks. In: 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, pp. 172\u2013177 (2005)","DOI":"10.1109\/WETICE.2005.35"},{"key":"48_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-540-74976-9_33","volume-title":"Knowledge Discovery in Databases: PKDD 2007","author":"M. Akodjenou-Jeannin","year":"2007","unstructured":"Akodjenou-Jeannin, M., Salamatian, K., Gallinari, P.: Flexible Grid-Based Clustering. In: Kok, J.N., Koronacki, J., Lopez de Mantaras, R., Matwin, S., Mladeni\u010d, D., Skowron, A. (eds.) PKDD 2007. LNCS, vol.\u00a04702, pp. 350\u2013357. Springer, Heidelberg (2007)"},{"key":"48_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of information theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of information theory. John Wiley and Sons, Inc., Chichester (1991)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01399-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T01:27:40Z","timestamp":1684978060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01399-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642013980","9783642013997"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01399-7_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}