{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:15:30Z","timestamp":1725556530440},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/icpads.2007.4447772","type":"proceedings-article","created":{"date-parts":[[2008,2,15]],"date-time":"2008-02-15T12:32:18Z","timestamp":1203078738000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Stepping-stone detection algorithm based on order preserving mapping"],"prefix":"10.1109","author":[{"family":"Ying-Wei Kuo","sequence":"first","affiliation":[]},{"family":"Shou-Hsuan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1046290.1046331"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.151"},{"key":"ref12","first-page":"31","article-title":"Finding a Connection Chain for Tracing Intruders","author":"yoda","year":"2000","journal-title":"Proceedings of the 6th European Symposium on Research in Computer Security ESORICS'2000"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286555"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/.2006.1629414"},{"key":"ref4","first-page":"1","article-title":"Detecting long connection chains of interactive terminal sessions","author":"yung","year":"2002","journal-title":"RAID 2002"},{"key":"ref3","first-page":"171","article-title":"Detecting Stepping Stones","author":"zhang","year":"2000","journal-title":"Proc of the 9th USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-540-30143-1_14","article-title":"Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds","author":"blum","year":"2004","journal-title":"Proc of 7th International Symposium on Recent Advances in Intrusion Detection"},{"key":"ref5","article-title":"Inter-Packet Delay-Based Correlation for Tracing Encrypted Connections through Stepping Stones","author":"wang","year":"2002","journal-title":"7th European Symposium on Research in Computer Security (ESORICS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890881"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36084-0_2","article-title":"Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay","author":"donoho","year":"2002","journal-title":"Int Symp Recent Advances in Intrusion Detection"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/AINA.2005.240","article-title":"Matching tcp packets and its application to the detection of long connection chains on the internet","author":"yang","year":"2005","journal-title":"Proc 19th Int Conf Advanced Information Networking and Applications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1995.398921"},{"key":"ref9","first-page":"20","article-title":"Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Inter-packet Delays","author":"wang","year":"2003","journal-title":"Proc of the 2003 ACM Conference on Computer and Communications Security"}],"event":{"name":"2007 International Conference on Parallel and Distributed Systems","start":{"date-parts":[[2007,12,5]]},"location":"Hsinchu","end":{"date-parts":[[2007,12,7]]}},"container-title":["2007 International Conference on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4447704\/4447779\/04447772.pdf?arnumber=4447772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T23:03:31Z","timestamp":1557270211000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4447772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icpads.2007.4447772","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}