{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:10:32Z","timestamp":1761675032164},"reference-count":9,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194879","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"130-138","source":"Crossref","is-referenced-by-count":36,"title":["Surveillance detection in high bandwidth environments"],"prefix":"10.1109","author":[{"given":"S.","family":"Robertson","sequence":"first","affiliation":[]},{"given":"E.V.","family":"Siegel","sequence":"additional","affiliation":[]},{"given":"M.","family":"Miller","sequence":"additional","affiliation":[]},{"given":"S.J.","family":"Stolfo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1997","key":"ref4","article-title":"The Art of Port Scanning"},{"year":"0","key":"ref3","article-title":"CERT&#x00AE; Advisory CA-2001&#x2013;26 Nimda Worm"},{"key":"ref6","first-page":"122","article-title":"Network Intrusion Detection: An Analyst's Handbook","author":"northcutt","year":"1999","journal-title":"Indianapolis New Riders"},{"key":"ref5","article-title":"Data Mining Approaches for Intrusion Detection","author":"lee","year":"1998","journal-title":"Proceedings of the Seventh USENIX Security Symposium (SECURITY '98)"},{"year":"0","author":"roesch","key":"ref8"},{"year":"0","key":"ref7","article-title":"scanlogd: a port scan detection tool"},{"year":"0","key":"ref2","article-title":"CERT&#x00AE; Advisory CA-2001&#x2013;23 Continued Threat of the &#x2018;Code Red&#x2019; Worm"},{"key":"ref9","article-title":"Practical Automated Detection of Stealthy Portscans","author":"staniford","year":"2000","journal-title":"Seventh ACM Conference on Computer and Communications Security"},{"key":"ref1","article-title":"Detecting Novel Attacks by Identifying Anomalous Network Packet Headers","author":"chan","year":"2001","journal-title":"Florida Tech"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194879.pdf?arnumber=1194879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:53:34Z","timestamp":1489427614000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194879\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194879","relation":{},"subject":[]}}