{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:10:09Z","timestamp":1730279409453,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906329","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T10:59:25Z","timestamp":1412074765000},"page":"37-43","source":"Crossref","is-referenced-by-count":11,"title":["Towards a taxonomy of darknet traffic"],"prefix":"10.1109","author":[{"given":"Jun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Kensuke","family":"Fukuda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2109009"},{"journal-title":"The Iatmon Tool","year":"0","key":"18"},{"journal-title":"The Rose Attack Explained","year":"0","key":"15"},{"key":"16","first-page":"179","article-title":"One-way traffic monitoring with iatmon","author":"brownlee","year":"2012","journal-title":"PAM12"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0777"},{"journal-title":"Microsoft Report","article-title":"Protect yourself from the conficker computer worm","year":"2009","key":"14"},{"journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","year":"0","author":"lyon","key":"11"},{"key":"12","volume":"1","author":"kevin","year":"2011","journal-title":"Richard Stevens TCP\/IP Illustrated"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068818"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2254756.2254821"},{"journal-title":"Network Telescopes","year":"2004","author":"moore","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"5","first-page":"12","article-title":"Inferring internet denial-of-service activity","author":"moore","year":"2001","journal-title":"Usenix Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298316"},{"key":"9","first-page":"167","article-title":"The internet motion sensor-A distributed blackhole monitoring system","author":"cooke","year":"2005","journal-title":"NDSS05"},{"key":"8","first-page":"146","article-title":"On the design and use of internet sinks for network abuse monitoring","author":"yegneswaran","year":"2004","journal-title":"RAID04"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906329.pdf?arnumber=6906329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T12:05:40Z","timestamp":1602677140000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906329","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}