{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T18:24:11Z","timestamp":1745432651104},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746789","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T15:29:46Z","timestamp":1232119786000},"page":"581-586","source":"Crossref","is-referenced-by-count":7,"title":["A NetFlow based internet-worm detecting system in large network"],"prefix":"10.1109","author":[{"given":"Yi-Tung F.","family":"Chan","sequence":"first","affiliation":[]},{"given":"Charles A.","family":"Shoniregun","sequence":"additional","affiliation":[]},{"given":"Galyna A.","family":"Akmayeva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"automated nids signature creation using honeypots","author":"kreibich","year":"2003","journal-title":"Poster paper SIGCOMM"},{"key":"14","article-title":"network telescopes: observing small or distant security events","author":"moore","year":"2002","journal-title":"Invited Presentation at the 11th USENIX Security Symposium (SEC)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2004.1283903"},{"key":"12","article-title":"honeyd: a virtual honeypot framework","author":"provos","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"journal-title":"Snort - the de facto standard for intrusion detection\/prevention","year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948190"},{"key":"1","article-title":"how to own the internet in your spare time","author":"staniford","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029625"},{"key":"7","article-title":"internet threat detection system using bayesian estimation","author":"ishiguro","year":"2004","journal-title":"16th Annul FIRST Conference on Computer Security Incident Handling"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30143-1_11","article-title":"anomalous payload-based network intrusion detection","author":"wang","year":"2004","journal-title":"8th Int Symp Recent Advances in Intrusion Detection"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30143-1_4","article-title":"fast detection of scanning worm infections","author":"schechter","year":"2004","journal-title":"8th Int Symp Recent Advances in Intrusion Detection"},{"key":"8","article-title":"automated worm fingerprinting","author":"singh","year":"2004","journal-title":"Proc 6th Symp Operating Systems Design and Implementation"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746789.pdf?arnumber=4746789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T15:50:55Z","timestamp":1497801055000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4746789\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746789","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}