{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:16:42Z","timestamp":1743031002413,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642330179"},{"type":"electronic","value":"9783642330186"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33018-6_15","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:14:19Z","timestamp":1345713259000},"page":"151-158","source":"Crossref","is-referenced-by-count":0,"title":["Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number Generators"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Zelinka","sequence":"first","affiliation":[]},{"given":"Filip","family":"Merhaut","sequence":"additional","affiliation":[]},{"given":"Lenka","family":"Skanderova","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Strange Attractors and TCP\/IP Sequence Number Analysis, \n                    http:\/\/lcamtuf.coredump.cx\/newtcp\/"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Dorrendorf, L., Gutterman, Z., Pinkas, B.: Cryptoanalysis of the Random Number Generator of the Windows Operating System. ACM Transactions on Information and System Security\u00a013(1)","DOI":"10.1145\/1609956.1609966"},{"key":"15_CR3","volume-title":"SP 2006 Proceedings of the 2006 IEEE Symposium on Security and Privacy","author":"L. Dorrendorf","year":"2006","unstructured":"Dorrendorf, L., Gutterman, Z., Reinman, T.: Analysis of the Linux Random Number Generator. In: SP 2006 Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC (2006)"},{"key":"15_CR4","unstructured":"Jiao, J., Wu, W.: A Method of Identify OS Based On TCP\/IP Fingerprint. IJCSNS International Journal of Computer Science and Network Security\u00a06(7B) (July 2006)"},{"key":"15_CR5","unstructured":"Howard, M., LeBlanc, D.: Writing secure code. Microsoft Press, ISBN-10: 0735617228"},{"key":"15_CR6","unstructured":"FIPS 140-1 Security requirements for cryptographics modules, \n                    http:\/\/www.itl.nist.gov\/fipspubs\/fip140-1.htm"},{"key":"15_CR7","unstructured":"Lecture 28: Random Numbers - Richard Buckland UNSW (2008), \n                    http:\/\/wn.com\/Lecture_28_Random_Numbers__Richard_Buckland_UNSW_2008"},{"key":"15_CR8","unstructured":"Bose, N.K., Liang, P.: Neural Network Fundamentals with Graphs, Algorithms, and Applications. McGraw-Hill Series in Electrical and Computer Engineering (1996) ISBN 0-07-006618-3"},{"key":"15_CR9","unstructured":"Barnsley, M.: Fractals Everywhere. Academic Professional Press (1993) ISBN 0-12-079061-0"},{"key":"15_CR10","volume-title":"Chaos and Nonlinear Dynamics","author":"R.C. Hilborn","year":"1994","unstructured":"Hilborn, R.C.: Chaos and Nonlinear Dynamics. Oxford University Press, UK (1994) ISBN 0-19-508816-8"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33018-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T17:10:11Z","timestamp":1675098611000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33018-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642330179","9783642330186"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33018-6_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}