{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:50:08Z","timestamp":1729623008131,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iwcmc.2013.6583681","type":"proceedings-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T19:31:30Z","timestamp":1377804690000},"page":"926-933","source":"Crossref","is-referenced-by-count":2,"title":["On detecting and clustering distributed cyber scanning"],"prefix":"10.1109","author":[{"given":"Elias","family":"Bou-Harb","sequence":"first","affiliation":[]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[]},{"given":"Chadi","family":"Assi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.49.1685"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378947"},{"year":"2013","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660534"},{"journal-title":"SNMP Overhead and Performance Impact","year":"2003","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/nem.729"},{"journal-title":"A Simple Network Management Protocol (SNMP)","year":"1990","key":"13"},{"journal-title":"SNMP SNMPV2 SNMPV3 and RMON 1 and 2","year":"1998","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2109009"},{"key":"12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","article-title":"Practical automated detection of stealthy portscans","volume":"10","author":"staniford","year":"2002","journal-title":"Journal of Computer Security"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.314"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.03.011"},{"journal-title":"Spectral Analysis and Time Series","year":"1981","author":"priestley","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2008.01.060"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.011114"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"journal-title":"EMarksoft SNMP Component","year":"2002","key":"26"},{"year":"2004","author":"roelker","key":"27"},{"year":"0","key":"28"},{"key":"29","article-title":"Inferring internet denial-of-service activity","author":"moore","year":"2001","journal-title":"Technical Report"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"journal-title":"Advanced Persistent Threat","year":"2009","author":"daly","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029216"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096160"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2008.4537071"},{"journal-title":"Ottawa Needs to Improve Cyber Security Auditor General","year":"2012","key":"6"},{"key":"32","article-title":"Nmap network scanning: The official nmap project guide to network discovery and security scanning author","volume":"1","author":"lyon","year":"2009","journal-title":"Gordon Fyodor"},{"journal-title":"Cyber War 2 0 Russia V Georgia","year":"2012","key":"5"},{"journal-title":"The tcpdump manual page","year":"1989","author":"jacobson","key":"31"},{"journal-title":"W32 stuxnet Dossier","year":"2012","key":"4"},{"key":"9","article-title":"Collaborative detection of coordinated port scans","author":"baldoni","year":"2012","journal-title":"Technical Report"},{"key":"8","first-page":"339","article-title":"Aocd: An adaptive outlier based coordinated scan detection approach","volume":"14","author":"bhuyan","year":"2012","journal-title":"International Journal of Network Security"}],"event":{"name":"2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC 2013)","start":{"date-parts":[[2013,7,1]]},"location":"Sardinia, Italy","end":{"date-parts":[[2013,7,5]]}},"container-title":["2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6578011\/6583517\/06583681.pdf?arnumber=6583681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T16:30:55Z","timestamp":1563813055000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6583681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2013.6583681","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}