{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:10:57Z","timestamp":1725480657327},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642356674"},{"type":"electronic","value":"9783642356681"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35668-1_8","type":"book-chapter","created":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T05:07:03Z","timestamp":1357276023000},"page":"102-117","source":"Crossref","is-referenced-by-count":3,"title":["Collaborative Detection of Coordinated Port Scans"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Baldoni","sequence":"first","affiliation":[]},{"given":"Giuseppe Antonio","family":"Di Luna","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Querzoni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Gates, C.: Coordinated scan detection. In: Proceedings of NDSS 2009 (2009)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2009.06.008","volume":"29","author":"C.V. Zhou","year":"2010","unstructured":"Zhou, C.V., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computer and Security\u00a029, 124\u2013140 (2009-2010)","journal-title":"Computer and Security"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1287\/ijoc.12.3.164.12639","volume":"12","author":"M. Prais","year":"1998","unstructured":"Prais, M., Ribeiro, C.C.: Reactive grasp: An application to a matrix decomposition problem in tdma traffic assignment. INFORMS Journal on Computing\u00a012, 164\u2013176 (1998)","journal-title":"INFORMS Journal on Computing"},{"key":"8_CR4","unstructured":"hybrid, Distributed Information Gathering (2011), \n                  \n                    http:\/\/www.phrack.org\/issues.html?issue=55&id=9"},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","volume":"10","author":"S. Staniford","year":"2002","unstructured":"Staniford, S., Hoagland, J.A., Mcalerney, J.M.: Practical automated detection of stealthy portscans. Journal of Computer Security\u00a010, 105\u2013136 (2002)","journal-title":"Journal of Computer Security"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/1029208.1029216","volume-title":"Proceedings of VizSEC\/DMSEC 2004","author":"G. Conti","year":"2004","unstructured":"Conti, G., Abdullah, K.: Passive visual fingerprinting of network attack tools. In: Proceedings of VizSEC\/DMSEC 2004, pp. 45\u201354. ACM, New York (2004)"},{"key":"8_CR7","unstructured":"Robertson, S., Siegel, E.V., Miller, M., Stolfo, S.J.: Surveillance detection in high bandwidth environments. In: Proceedings of DARPA DISCEX III, pp. 229\u2013238. IEEE Press (2003)"},{"key":"8_CR8","unstructured":"DShield: Cooperative Network Security Community - Internet Security (2009), \n                  \n                    http:\/\/www.dshield.org\/indexd.html\/"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/885651.781045","volume":"31","author":"V. Yegneswaran","year":"2003","unstructured":"Yegneswaran, V., Barford, P., Ullrich, J.: Internet intrusions: global characteristics and prevalence. SIGMETRICS Perform. Eval. Rev.\u00a031, 138\u2013147 (2003)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Baldoni, R., Chockler, G.: Collaborative Financial Infrastructure Protection. Springer (2012)","DOI":"10.1007\/978-3-642-20420-3"},{"key":"8_CR11","unstructured":"Baldoni, R., Luna, G.D., Querzoni, L.: Collaborative Detection of Coordinated Port Scans, MIDLAB 1\/12 - University of Rome \u201cLa Sapienza\u201d Tech. Rep. (2012), \n                  \n                    http:\/\/www.dis.uniroma1.it\/~midlab\/publications.php"},{"issue":"23","key":"8_CR12","doi-asserted-by":"publisher","first-page":"8577","DOI":"10.1073\/pnas.0601602103","volume":"103","author":"M.E.J. Newman","year":"2006","unstructured":"Newman, M.E.J.: Modularity and community structure in networks. Proceedings of the National Academy of Sciences\u00a0103(23), 8577\u20138582 (2006)","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Blondel, V., Guillaume, J., Lambiotte, R., Mech, E.: Fast unfolding of communities in large networks. J. Stat. Mech., 10008 (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"8_CR14","unstructured":"Jung (2011), \n                  \n                    http:\/\/jung.sourceforge.net\/"},{"key":"8_CR15","unstructured":"Esper (2011), \n                  \n                    http:\/\/esper.codehaus.org\/"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35668-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T01:21:32Z","timestamp":1557451292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35668-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642356674","9783642356681"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35668-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}