{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:14Z","timestamp":1725548294237},"publisher-location":"Berlin, Heidelberg","reference-count":77,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_20","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"383-405","source":"Crossref","is-referenced-by-count":13,"title":["Network Traffic Analysis and SCADA Security"],"prefix":"10.1007","author":[{"given":"Abdun Naser","family":"Mahmood","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammed","family":"Atiquzzaman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","volume-title":"Network and Distributed Systems Management","author":"M. Sloman","year":"1994","unstructured":"M.\u00a0Sloman: Network and Distributed Systems Management (Addison-Wesley Longman, Boston, MA, USA 1994)"},{"issue":"6","key":"20_CR2","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TKDE.2007.190725","volume":"20","author":"A. Mahmood","year":"2008","unstructured":"A.\u00a0Mahmood, C.\u00a0Leckie, P.\u00a0Udaya: An efficient clustering scheme to exploit hierarchical data in network traffic analysis, IEEE Trans. Knowl. Data Eng. 20(6), 752\u2013767 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"C. Estan, S. Savage, G. Varghese: Automatically inferring patterns of resource consumption in network traffic, Proc. ACM SIGCOMM Conference (2003)","DOI":"10.1145\/863955.863972"},{"key":"20_CR4","volume-title":"An engineering approach to computer networking: ATM networks, the internet, and the telephone network","author":"S. Keshav","year":"1997","unstructured":"S. Keshav: An engineering approach to computer networking: ATM networks, the internet, and the telephone network (Addison-Wesley Longman, Boston, MA, USA 1997)"},{"issue":"4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0166-5316(87)90013-7","volume":"7","author":"Z. Dziong","year":"1987","unstructured":"Z.\u00a0Dziong, J.\u00a0Roberts: Congestion probabilities in a circuit-switched integrated services network, Perform. Eval. 7(4), 267\u2013284 (1987)","journal-title":"Perform. Eval."},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"112","DOI":"10.2307\/1427273","volume":"20","author":"F. Kelly","year":"1988","unstructured":"F.\u00a0Kelly: Routing in circuit-switched networks: optimization, shadow prices and decentralization, Adv. Appl. Probab. 20(1), 112\u2013144 (1988)","journal-title":"Adv. Appl. Probab."},{"issue":"433","key":"20_CR7","doi-asserted-by":"publisher","first-page":"365","DOI":"10.2307\/2291416","volume":"91","author":"Y. Vardi","year":"1996","unstructured":"Y.\u00a0Vardi: Network tomography: estimating source-destination traffic intensities from link data, J. Am. Stat. Assoc. 91(433), 365\u2013377 (1996)","journal-title":"J. Am. Stat. Assoc."},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"A. Medina et al.: Traffic matrix estimation: existing techniques and new directions, Proc. 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (2002) pp. 161\u2013174","DOI":"10.1145\/633025.633041"},{"issue":"452","key":"20_CR9","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.2307\/2669743","volume":"95","author":"J. Cao","year":"2000","unstructured":"J.\u00a0Cao: Time-varying network tomography: router link data, J. Am. Stat. Assoc. 95(452), 1063\u20131075 (2000)","journal-title":"J. Am. Stat. Assoc."},{"key":"20_CR10","unstructured":"O. Goldschmidt: ISP backbone traffic inference methods to support traffic engineering, Internet Statistics and Metrics Analysis (ISMA) Workshop (2000) pp. 1063\u20131075"},{"issue":"442","key":"20_CR11","doi-asserted-by":"publisher","first-page":"557","DOI":"10.2307\/2670105","volume":"93","author":"C. Tebaldi","year":"1998","unstructured":"C.\u00a0Tebaldi, M.\u00a0West: Bayesian inference of network traffic using link count data, J. Am. Stat. Association 93(442), 557\u2013573 (1998)","journal-title":"J. Am. Stat. Association"},{"key":"20_CR12","unstructured":"M. Cai et al.: Fast and accurate traffic matrix measurement using adaptive cardinality counting, Applications, Technologies, Architectures, and Protocols for Computer Communication (2005) pp. 205\/206"},{"issue":"3","key":"20_CR13","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1145\/859716.859719","volume":"21","author":"C. Estan","year":"2003","unstructured":"C.\u00a0Estan, G.\u00a0Varghese: New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice, ACM Trans. Comput. Syst. 21(3), 270\u2013313 (2003)","journal-title":"ACM Trans. Comput. Syst."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"B. Roh, S. Yoo: A novel detection methodology of network. In: Proc. ICT, Intl. Conf. on Telecom. Vol. 3124, (Springer Berlin, Heidelberg 2004) pp. 1226\u20131235","DOI":"10.1007\/978-3-540-27824-5_159"},{"key":"20_CR15","unstructured":"Network monitoring tools, available at http:\/\/www.slac.stanford.edu\/xorg\/nmtf\/nmtf-tools.html"},{"key":"20_CR16","unstructured":"Network visualization tools, available at http:\/\/www.caida.org\/funding\/internetatlas\/viz\/viztools.html (2000)"},{"key":"20_CR17","unstructured":"Flow-tools, available at http:\/\/www.splintered.net\/sw\/flow-tools\/ (2000)"},{"key":"20_CR18","unstructured":"cflowd: Traffic flow analysis tool, available at http:\/\/www.caida.org\/tools\/measurement\/cflowd\/ (2000)"},{"issue":"8","key":"20_CR19","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/35.707822","volume":"36","author":"R. Addie","year":"1998","unstructured":"R.\u00a0Addie, M.\u00a0Zukerman, T.\u00a0Neame: Broadband traffic modeling: simple solutions to hard problems, Commun. Mag. IEEE 36(8), 88\u201395 (1998)","journal-title":"Commun. Mag. IEEE"},{"issue":"8","key":"20_CR20","first-page":"961","volume":"45","author":"W. Willinger","year":"1998","unstructured":"W.\u00a0Willinger, V.\u00a0Paxson: Where mathematics meets the internet, Notices Am. Math. Soc. 45(8), 961\u2013970 (1998)","journal-title":"Notices Am. Math. Soc."},{"issue":"3","key":"20_CR21","doi-asserted-by":"crossref","first-page":"305","DOI":"10.3233\/JHS-1993-2307","volume":"2","author":"J. Bolot","year":"1993","unstructured":"J.\u00a0Bolot: Characterizing end-to-end packet delay and loss in the Internet, J. High-Speed Netw. 2(3), 305\u2013323 (1993)","journal-title":"J. High-Speed Netw."},{"key":"20_CR22","unstructured":"P. Huang, A. Feldmann, W. Willinger: A non-intrusive, wavelet-based approach to detecting network performance problems, Internet Measurement Workshop (2005)"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Y. Zhang, N. Duffield: On the constancy of internet path properties, Proc. 1st ACM SIGCOMM Workshop on Internet Measurement (2001) pp. 197\u2013211","DOI":"10.1145\/505202.505228"},{"issue":"3","key":"20_CR24","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/90.779192","volume":"7","author":"V. Paxson","year":"1999","unstructured":"V.\u00a0Paxson: End-to-end internet packet dynamics, IEEE\/ACM Trans. Netw. 7(3), 277\u2013292 (1999)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"P. Barford et al.: A signal analysis of network traffic anomalies, Proc. 2nd ACM SIGCOMM Workshop on Internet Measurement (ACM Press, New York, NY, USA 2002)","DOI":"10.1145\/637201.637210"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1007\/978-3-540-24693-0_86","volume-title":"Networking\u20192004","author":"S. Kim","year":"2004","unstructured":"S. Kim, A. Reddy, M. Vannucci: Detecting traffic anomalies through aggregate analysis of packet header data. In: Networking\u20192004, Lecture Notes in Computer Science, Vol.\u00a03042, ed. by N.\u00a0Mitrou, K.\u00a0Kontovasilis, G.N.\u00a0Rouskas, I.\u00a0Iliadis, L.\u00a0Merakos (Springer, Berlin Heidelberg 2004) pp.\u00a01047\u20131059"},{"key":"20_CR27","unstructured":"AutoFocus tool, available at http:\/\/www.caida.org\/tools\/measurement\/autofocus\/ (2003)"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"G. Cormode et al.: Finding hierarchical heavy hitters in data streams, Proc. VLDB (2003)","DOI":"10.1016\/B978-012722442-8\/50048-3"},{"key":"20_CR29","volume-title":"Diamond in the rough: finding hierarchical heavy hitters in multi-dimensional data, Proc. ACM SIGMOD","author":"G. Cormode","year":"2004","unstructured":"G. Cormode et al.: Diamond in the rough: finding hierarchical heavy hitters in multi-dimensional data, Proc. ACM SIGMOD (ACM Press, New York, NY, USA 2004)"},{"key":"20_CR30","unstructured":"M. Kim et al.: A flow-based method for abnormal network traffic detection, IEEE\/IFIP Network Operations and Management Symposium, Seoul (2004)"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1007\/11422778_59","volume-title":"Networking\u20192005","author":"P. Chhabra","year":"2005","unstructured":"P. Chhabra, A. John, H. Saran: PISA: automatic extraction of traffic signatures. In: Networking\u20192005, Lecture Notes in Computer Science, Vol.\u00a03462, ed. by R.\u00a0Boutaba, K.\u00a0Almeroth, R.\u00a0Puigjaner, S.\u00a0Shen, J.P.\u00a0Black (Springer, Berlin Heidelberg 2005) pp.\u00a0730\u2013742"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"N. Duffield, C. Lund, M. Thorup: Charging from sampled network usage, Proc. 1st ACM SIGCOMM Workshop on Internet Measurement (ACM Press, New York, NY, USA 2001)","DOI":"10.1145\/505202.505232"},{"issue":"4","key":"20_CR33","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1145\/167954.166256","volume":"23","author":"K. Claffy","year":"1993","unstructured":"K.\u00a0Claffy, G.\u00a0Polyzos, H.\u00a0Braun: Application of sampling methodologies to network traffic characterization, ACM SIGCOMM Comput. Commun. Rev. 23(4), 194\u2013203 (1993)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"A. Kumar et al.: Data streaming algorithms for efficient and accurate estimation of flow size distribution, Proc. ACM SIGMETRICS\/Performance (2004)","DOI":"10.1145\/1005686.1005709"},{"issue":"1","key":"20_CR35","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1006\/jcss.1997.1545","volume":"58","author":"N. Alon","year":"1999","unstructured":"N.\u00a0Alon, Y.\u00a0Matias, M.\u00a0Szegedy: The space complexity of approximating the frequency moments, J. Comput. Syst. Sci. 58(1), 137\u2013147 (1999)","journal-title":"J. Comput. Syst. Sci."},{"key":"20_CR36","doi-asserted-by":"crossref","unstructured":"P. Benko, A. Veres: A passive method for estimating end-to-end tcp packet loss, Global Telecommunications Conference (2002)","DOI":"10.1109\/GLOCOM.2002.1189102"},{"key":"20_CR37","unstructured":"S. Jaiswal et al.: Inferring TCP connection characteristics through passive measurements, INFOCOM 2004, 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (2004)"},{"issue":"1","key":"20_CR38","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TNET.2006.890117","volume":"15","author":"S. Jaiswal","year":"2007","unstructured":"S.\u00a0Jaiswal: Measurement and classification of out-of-sequence packets in a Tier-1 IP backbone, IEEE\/ACM Trans. Netw. 15(1), 54\u201366 (2007)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"20_CR39","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/571697.571725","volume":"32","author":"H. Jiang","year":"2002","unstructured":"H.\u00a0Jiang, C.\u00a0Dovrolis: Passive estimation of TCP round-trip times, ACM SIGCOMM Comput. Commun. Rev. 32(3), 75\u201388 (2002)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"20_CR40","unstructured":"S. Katti et al.: M&M: A passive toolkit for measuring, tracking and correlating path characteristics, Proc. ACM Internet Measurements Conference (2004)"},{"key":"20_CR41","doi-asserted-by":"crossref","unstructured":"Y. Zhang et al.: On the characteristics and origins of internet flow rates, Proc. 2002 SIGCOMM Conference (ACM Press, New York, NY, USA 2002)","DOI":"10.1145\/633025.633055"},{"key":"20_CR42","unstructured":"J. Curtis: Principles of passive measurement, avail able at http:\/\/www.wand.net.nz\/pubs\/19\/html\/node10.html (2007)"},{"key":"20_CR43","unstructured":"M. Muuss: The story of the PING program, available at http:\/\/ftp.arl.mil\/ mike\/ping.html (1983)"},{"key":"20_CR44","doi-asserted-by":"crossref","unstructured":"G. Malkin: Traceroute using an IP option, RFC1393 (January, 1993), available at http:\/\/tools.ietf.org\/html\/rfc1393","DOI":"10.17487\/rfc1393"},{"key":"20_CR45","unstructured":"V. Jacobson: Pathchar-A tool to infer characteristics of internet paths, available at http:\/\/tools.ietf.org\/html\/rfc1393 (1997)"},{"key":"20_CR46","unstructured":"K. Kendall: A database of computer attacks for the evaluation of intrusion detection systems, M.Sc. Thesis (MIT Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1999) p. 124"},{"key":"20_CR47","unstructured":"J. Cleary et al.: Design principles for accurate passive measurement, Proc. Passive and Active Measurement Workshop (2000)"},{"key":"20_CR48","unstructured":"WAND Network Research Group: http:\/\/www.wand.net.nz\/ (2007)"},{"key":"20_CR49","unstructured":"Endace network monitoring, latency measurement and application acceleration solutions, available at http:\/\/www.endace.com\/ (2007)"},{"key":"20_CR50","volume-title":"Computer Networking","author":"J. Kurose","year":"2003","unstructured":"J.\u00a0Kurose, K.\u00a0Ross: Computer Networking (Addison-Wesley, Boston 2003)"},{"key":"20_CR51","unstructured":"Cisco: Introduction to Cisco IOS NetFlow \u2013 a technical overview (Cisco Systems Inc., 2007)"},{"key":"20_CR52","doi-asserted-by":"crossref","unstructured":"A. Myers: JFlow: Practical mostly-static information flow control, Proc. 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (ACM Press, New York, NY, USA 1999)","DOI":"10.1145\/292540.292561"},{"key":"20_CR53","unstructured":"Technical white paper for NetStream, available at http:\/\/www.huawei.com\/products\/datacomm\/pdf\/view.do?f=65 (2007)"},{"key":"20_CR54","unstructured":"B. Claise, M. Fullmer: IPFIX protocol specifications, Draft IETF IPFIX Protocol-3 (2004)"},{"key":"20_CR55","unstructured":"T. Oetiker: MRTG \u2013 the multi router traffic grapher, Proc. 12th Systems Administration Conference (LISA\u201998) (1998)"},{"key":"20_CR56","unstructured":"Cricket: A high performance system for monitoring trends in time-series data, available at http:\/\/cricket.sourceforge.net\/ (2003)"},{"key":"20_CR57","unstructured":"T. Oetiker: The RRDtool manual, available at http:\/\/ee-staff.ethz.ch\/oetiker\/webtools\/rrdtool\/manual\/index.html (1998)"},{"key":"20_CR58","unstructured":"D. Plonka: FlowScan: a network traffic flow reporting and visualization tool, 14th USENIX Conference on System Administration, New Orleans, LA (2000)"},{"key":"20_CR59","unstructured":"S. Leinen: Fluxoscope: a system for flow-based accounting, available at http:\/\/www.tik.ee.ethz.ch\/ cati\/deliv\/CATI-SWI-IM-P-000-0.4.pdf (2000)"},{"key":"20_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/3-540-48100-1_21","volume-title":"Active Technologies for Network and Service Management","author":"L. Deri","year":"1999","unstructured":"L. Deri, S.\u00a0Suin: Ntop: beyond ping and traceroute. In: Active Technologies for Network and Service Management, Lecture Notes in Computer Science, Vol.\u00a01700, ed. by R.\u00a0Stadler, B.\u00a0Stiller (Springer, Berlin Heidelberg 1999) pp.\u00a0271\u2013283"},{"key":"20_CR61","unstructured":"S. Romig, M. Fullmer, R. Luman: The OSU flow-tools package and Cisco NetFlow logs, Proc. USENIX LISA (1995)"},{"key":"20_CR62","doi-asserted-by":"crossref","unstructured":"J. Erman, M. Arlitt, A. Mahanti: Traffic classification using clustering algorithms, Proc. ACM SIGCOMM Workshop on Mining Network Data (MineNet), Pisa, Italy (2006)","DOI":"10.1145\/1162678.1162679"},{"issue":"6","key":"20_CR63","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1109\/TNET.2005.860096","volume":"13","author":"G. Cormode","year":"2005","unstructured":"G.\u00a0Cormode, S.\u00a0Muthukrishnan: What\u2019s new: finding significant differences in network data streams, IEEE\/ACM Trans. Netw. 13(6), 1219\u20131232 (2005)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"20_CR64","unstructured":"C. Hood, C. Ji: Proactive network fault detection, Proc. IEEE INFOCOM\u201997, Kobe, Japan (1997)"},{"issue":"6","key":"20_CR65","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/90.477721","volume":"3","author":"I. Katzela","year":"2000","unstructured":"I. Katzela, M. Schwartz: Schemes for fault identification in communications networks, IEEE\/ACM Trans. Netw. 3(6), 753\u2013764 (0000)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"20_CR66","doi-asserted-by":"crossref","unstructured":"A. Ward, P. Glynn, K. Richardson: Internet service performance failure detection, Proc. Internet Server Performance Workshop (1998)","DOI":"10.1145\/306225.306237"},{"key":"20_CR67","doi-asserted-by":"crossref","unstructured":"F. Feather, D. Siewiorek, R. Maxion: Fault detection in an ethernet network using anomaly signature matching, Applications, Technologies, Architectures, and Protocols for Computer Communication (1993) pp. 279\u2013288","DOI":"10.1145\/166237.166264"},{"key":"20_CR68","doi-asserted-by":"crossref","unstructured":"G. Manku, R. Motwani: Approximate frequency counts over data streams, Proc. 28th International Conference on Very Large Data Bases (VLDB 2002) (Morgan Kaufmann, 2002)","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"20_CR69","unstructured":"M. Fang et al.: Computing iceberg queries efficiently, Proc. 24th International Conference on Very Large Data Bases (VLDB 1998) (1998)"},{"key":"20_CR70","first-page":"550","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2006","unstructured":"J.\u00a0Han, M.\u00a0Kamber: Data Mining: Concepts and Techniques (Morgan Kaufmann, San Francisco 2006) p.\u00a0550"},{"issue":"2","key":"20_CR71","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1145\/304181.304214","volume":"28","author":"K. Beyer","year":"1999","unstructured":"K.\u00a0Beyer, R.\u00a0Ramakrishnan: Bottom-up computation of sparse and iceberg CUBE, ACM SIGMOD Rec. 28(2), 359\u2013370 (1999)","journal-title":"ACM SIGMOD Rec."},{"key":"20_CR72","unstructured":"R. Agrawal, R. Srikant: Fast algorithms for mining association rules, Proc. VLDB 1994, 20th International Conference of Very Large Data Bases (1994)"},{"key":"20_CR73","unstructured":"Internet Assigned Numbers Authority (2008)"},{"key":"20_CR74","unstructured":"Pacific Northwest National Laboratory: The role of authenticated communications for electric power distribution, Position Paper for the National Work shop \u2013 Beyond SCADA: Networked Embedded Control for Cyber Physical Systems (Pacific Northwest National Laboratory, U.S. Department of Energy, 2006)"},{"key":"20_CR75","first-page":"117","volume-title":"Critical Infrastructure Protection (IFIP International Federation for Information Processing)","author":"R. Chandia","year":"2008","unstructured":"R. Chandia, J. Gonzalez, T. Kilpatrick, M. Papa, S.\u00a0Shenoi: Critical Infrastructure Protection (IFIP International Federation for Information Processing), ed. by S. Shenoi (Springer, Boston 2008) pp. 117\u2013131"},{"key":"20_CR76","unstructured":"M. Berg, J. Stamp: A reference model for control and automation systems in electric power, Sandia National Laboratories, available at http:\/\/www.sandia.gov\/scada\/documents\/sand_2005_1_000C.pdf"},{"key":"20_CR77","unstructured":"E. Byres et al.: Worlds in collision: ethernet on the plant floor, Proc. ISA Emerging Technologies Conference, Instrumentation Systems and Automation Society (2002)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:23Z","timestamp":1606185563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":77,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_20","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}