{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:22:20Z","timestamp":1743078140390,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642203046"},{"type":"electronic","value":"9783642203053"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20305-3_20","type":"book-chapter","created":{"date-parts":[[2011,4,5]],"date-time":"2011-04-05T02:55:14Z","timestamp":1301972114000},"page":"193-196","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Monitoring of Dark IP Address Space (Poster)"],"prefix":"10.1007","author":[{"given":"Iasonas","family":"Polakis","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Kontaxis","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"20_CR1","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s10922-007-9070-0","volume":"15","author":"L. Deri","year":"2007","unstructured":"Deri, L.: High-speed dynamic packet filtering. Journal of Network and Systems Management\u00a015(3), 401\u2013415 (2007)","journal-title":"Journal of Network and Systems Management"},{"key":"20_CR2","unstructured":"Jiang, X., Xu, D.: Collapsar: A VM-Based Architecture for Network Attack Detention Center. In: Proceedings of the 13th USENIX Security Sumposium (2004)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Di Pietro, A., Huici, F., Costantini, D., Niccolini, S.: Decon: Decentralized coordination for large-scale flow monitoring. In: IEEE Conference on Computer Communications, INFOCOM (2010)","DOI":"10.1109\/INFCOMW.2010.5466642"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Anagnostakis, K., Antonatos, S., Markatos, E.P.: Honey@home: A new approach to large-scale threat monitoring. In: The Proceedings of the 5th ACM Workshop on Recurring Malcode, WORM (2007)","DOI":"10.1145\/1314389.1314398"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Trimintzios, P., Polychronakis, M., Papadogiannakis, A., Foukarakis, M., Markatos, E., \u00d8sleb\u00f8, A.: DiMAPI: An application programming interface for distributed network monitoring. In: Proceedings of the 10th IEEE\/IFIP Network Operations and Management Symposium, NOMS (2006)","DOI":"10.1109\/NOMS.2006.1687568"},{"key":"20_CR6","unstructured":"Wu, Z., Xie, M., Wang, H.: Swift: a fast dynamic packet filter. In: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2008 (2008)"}],"container-title":["Lecture Notes in Computer Science","Traffic Monitoring and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20305-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T14:51:00Z","timestamp":1558536660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20305-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642203046","9783642203053"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20305-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}