{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:41:53Z","timestamp":1725432113555},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/iscc.2007.4381605","type":"proceedings-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T16:55:20Z","timestamp":1194972920000},"page":"79-86","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient TCP Reassembler Mechanism for Layer7-aware Network Intrusion Detection\/Prevention Systems"],"prefix":"10.1109","author":[{"given":"Miyuki","family":"Hanaoka","sequence":"first","affiliation":[]},{"given":"Kenji","family":"Kono","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Shimamura","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Yamaguchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","journal-title":"Common Vulnerabilities and Exposures CVE-1999&#x2013;0712","key":"ref10"},{"key":"ref11","article-title":"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics","author":"handley","year":"2001","journal-title":"Proc of USENIX Security Symp"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/948143.948144"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/INFCOM.2000.832535"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref15","article-title":"Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection","author":"ptacek","year":"1998","journal-title":"Technical Report"},{"key":"ref16","article-title":"Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks","author":"robertson","year":"2006","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref17","first-page":"229","article-title":"Snort - Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"proceedings of Conference on system administration"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CONECT.2002.1039268"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/MM.2003.1179898"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"year":"2003","journal-title":"Microsoft Security Bulletin MS01&#x2013;033","key":"ref8"},{"year":"2002","journal-title":"CERT Advisory CA-2002&#x2013;27 Apache\/mod_ssl Worm","key":"ref7"},{"year":"0","key":"ref2"},{"key":"ref9","first-page":"136","article-title":"A Hardware Platform for Network Intrusion Detection and Prevention","author":"clark","year":"2004","journal-title":"Proceedings of The Workshop on Network Processors and Applications"},{"year":"0","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SECPRI.2003.1199327"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/948109.948145"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/505202.505214"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/CSAC.2003.1254308"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/CSAC.2004.4"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/1015467.1015489"}],"event":{"name":"2007 IEEE Symposium on Computers and Communications","start":{"date-parts":[[2007,7,1]]},"location":"Santiago, Portugal","end":{"date-parts":[[2007,7,4]]}},"container-title":["2007 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4381469\/4381470\/04381605.pdf?arnumber=4381605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T15:07:56Z","timestamp":1489676876000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4381605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iscc.2007.4381605","relation":{},"ISSN":["1530-1346"],"issn-type":[{"type":"print","value":"1530-1346"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}