{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:05:23Z","timestamp":1725696323562},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/icccn.2009.5235336","type":"proceedings-article","created":{"date-parts":[[2009,9,11]],"date-time":"2009-09-11T19:26:15Z","timestamp":1252697175000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Proxy-Based Security Audit System for Remote Desktop Access"],"prefix":"10.1109","author":[{"given":"Shi-hai","family":"Huang","sequence":"first","affiliation":[]},{"given":"Chuang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"An'an","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xue-hai","family":"Peng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Remote Desktop Protocol","year":"2008","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132029"},{"journal-title":"Xrdp An Open Source Remote Desktop Protocol(rdp) Server","year":"0","key":"11"},{"journal-title":"Rdesktop A Remote Desktop Protocol Client","year":"0","key":"12"},{"journal-title":"VNC An Open Source Software for Remote Control","year":"0","key":"3"},{"journal-title":"Remote Desktop Protocol (RDP) Features and Performance White Paper","article-title":"microsoft corporation","year":"0","key":"2"},{"journal-title":"CSI\/FBI Computer Crime & Security Survey","year":"2008","author":"richardson","key":"1"},{"journal-title":"RC4 A Stream Cipher Designed by Rivest for RSA Data Security","year":"0","key":"10"},{"journal-title":"Remote Desktop Protocol the Good the Bad and the Ugly","year":"0","author":"montoro","key":"7"},{"journal-title":"Reverse-engineering and Implementation of the RDP 5 Protocol","year":"2006","author":"forsberg","key":"6"},{"journal-title":"Implementors' Guide for Recommendations of the T 120 System T 120 Series","year":"2008","key":"5"},{"journal-title":"The X Org Project Provides an Open Source Implementation of the X Window System","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"ISO Transport Protocol Specification","year":"1984","key":"8"}],"event":{"name":"2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009","start":{"date-parts":[[2009,8,3]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2009,8,6]]}},"container-title":["2009 Proceedings of 18th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5235208\/5235209\/05235336.pdf?arnumber=5235336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T17:37:08Z","timestamp":1489772228000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5235336\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icccn.2009.5235336","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}