{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:11Z","timestamp":1725564611606},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642157653"},{"type":"electronic","value":"9783642157660"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15766-0_18","type":"book-chapter","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T20:41:05Z","timestamp":1283460065000},"page":"124-128","source":"Crossref","is-referenced-by-count":6,"title":["Network Forensic Analysis by Correlation of Attacks with Network Attributes"],"prefix":"10.1007","author":[{"given":"Atul Kant","family":"Kaushik","sequence":"first","affiliation":[]},{"given":"Emmanuel S.","family":"Pilli","sequence":"additional","affiliation":[]},{"given":"R. C.","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"The official google blog, \n                    \n                      http:\/\/googleblog.blogspot.com\/2010\/01\/new-approach-to-china.html"},{"key":"18_CR2","unstructured":"DDOS attackers continue hitting Twitter, Facebook, Google, \n                    \n                      http:\/\/www.computerworld.com\/s\/article\/9136402\/DDOS_attackers_continue_hitting_Twitter_Facebook_Google"},{"issue":"3","key":"18_CR3","first-page":"14","volume":"2","author":"A.K. Kaushik","year":"2010","unstructured":"Kaushik, A.K., Joshi, R.C.: Network Forensic System for ICMP Attacks. Int\u2019l J. of Comp. App.\u00a02(3), 14\u201321 (2010)","journal-title":"Int\u2019l J. of Comp. App."},{"issue":"4","key":"18_CR4","first-page":"1","volume":"1","author":"S. Mukkamala","year":"2003","unstructured":"Mukkamala, S., Sung, A.H.: Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques. Int\u2019l J. of Dig. Evidence\u00a01(4), 1\u201317 (2003)","journal-title":"Int\u2019l J. of Dig. Evidence"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-30582-8_7","volume-title":"Information Networking","author":"A. Almulhem","year":"2005","unstructured":"Almulhem, A., Traore, I.: Experience with engineering a network forensics system. In: Kim, C. (ed.) ICOIN 2005. LNCS, vol.\u00a03391, pp. 62\u201371. Springer, Heidelberg (2005)"},{"issue":"1\/2","key":"18_CR6","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","volume":"10","author":"S. Staniford","year":"2002","unstructured":"Staniford, S., Hoagland, J.A., McAlerney, J.M.: Practical automated detection of stealthy portscans. J. of Comp. Security\u00a010(1\/2), 105\u2013136 (2002)","journal-title":"J. of Comp. Security"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Bailey, M., Cooke, E., Jahanian, F., Provos, N., Rosaen, K., Watson, D.: Data reduction for the scalable automated analysis of distributed darknet traffic. In: 5th USENIX\/ACM Internet Measurement Conference, pp. 239\u2013252 (2005)","DOI":"10.1145\/1330107.1330135"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Maier, G., Sommer, R., Dreger, H., Feldmann, A., Paxson, V., Schneider, F.: Enriching network security analysis with time travel. In: ACM SIGCOMM 2008, pp. 183\u2013194 (2008)","DOI":"10.1145\/1402958.1402980"},{"key":"18_CR9","unstructured":"Wireshark\u2019s Users Guide, \n                    \n                      http:\/\/www.wireshark.org"}],"container-title":["Communications in Computer and Information Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15766-0_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T13:05:24Z","timestamp":1619787924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15766-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642157653","9783642157660"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15766-0_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}