{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T05:13:52Z","timestamp":1740806032224,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_8","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T12:57:18Z","timestamp":1290603438000},"page":"68-73","source":"Crossref","is-referenced-by-count":0,"title":["Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device"],"prefix":"10.1007","author":[{"given":"Bo-heung","family":"Chung","sequence":"first","affiliation":[]},{"given":"Jung-nye","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/0022-2836(81)90087-5","volume":"147","author":"T.F. Smith","year":"1981","unstructured":"Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol.\u00a0147, 195\u2013197 (1981)","journal-title":"J. Mol. Biol."},{"key":"8_CR2","unstructured":"Shi, Z., Ji, Z., Hu, M.: A Novel Distributed Intrusion Detection Model Based on Mobile Agent. In: ACM InfoSecu04, pp. 155\u2013159 (2006)"},{"key":"8_CR3","unstructured":"Yong-guang, Z., Wenke, L., Yi-an, H.: Intrusion Detection Technique for Mobile Wireless Networks. In: ACM MONET, pp. 545\u2013556 (2003)"},{"key":"8_CR4","unstructured":"Deepak, V.: An Efficient Signature Representation and Matching Method for Mobile Devices. In: Proceedings of the 2nd Annual International Workshop on Wireless Internet, vol.\u00a0220 (2006)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Geetha, R., Delbert, H.: A P2P Intrusion Detection System based on Mobile Agents. In: ACM ACME 2004, pp. 185\u2013195 (2004)","DOI":"10.1145\/986537.986581"},{"key":"8_CR6","unstructured":"National Center for Biotechnology Information, http:\/\/www.ncbi.nlm.nih.gov"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Yogesh Prem, S., Hannes, T.: Protecting Mobile Devices from TCP Flooding Attacks. In: ACM mobiArch 2006, pp. 63\u201368 (2006)","DOI":"10.1145\/1186699.1186717"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Benjamin, H.: Mobile Device Security. In: ACM InfoSecCD Conference 2004, pp. 99\u2013101 (2004)","DOI":"10.1145\/1059524.1059545"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/11551492_2","volume-title":"Digital Watermarking","author":"J. Ingemar","year":"2005","unstructured":"Ingemar, J., Ton, K., Georg, P., Mathias, S.: Information Transmission and Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 15\u201329. Springer, Heidelberg (2005)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"David, C., Sebastian, H., Pasquale, M.: Quantitative Analysis of the Leakage of Confidential Data. Electronic Notes in Theoretical Computer Science\u00a059(3) (2003)","DOI":"10.1016\/S1571-0661(04)00290-7"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-49380-8_21","volume-title":"Information Hiding","author":"C. Christian","year":"1998","unstructured":"Christian, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 306\u2013318. Springer, Heidelberg (1998)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Dan, B., James, S.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory\u00a044(5) (September 1998)","DOI":"10.1109\/18.705568"},{"key":"8_CR13","unstructured":"Binomial Distribution, http:\/\/en.wikipedia.org\/wiki\/Binomial_distribution"},{"key":"8_CR14","unstructured":"Digital Rights Management, http:\/\/en.wikipedia.org\/wiki\/Digital_rights_management"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T05:17:09Z","timestamp":1740719829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}