{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:12:13Z","timestamp":1730279533477,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwcmc.2017.7986317","type":"proceedings-article","created":{"date-parts":[[2017,7,20]],"date-time":"2017-07-20T20:38:06Z","timestamp":1500583086000},"page":"384-389","source":"Crossref","is-referenced-by-count":1,"title":["On correlating network traffic for cyber threat intelligence: A Bloom filter approach"],"prefix":"10.1109","author":[{"given":"Adil","family":"Atifi","sequence":"first","affiliation":[]},{"given":"Elias","family":"Bou-Harb","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"226","article-title":"Anagram: A content anomaly detector resistant to mimicry attack","author":"ke","year":"2006","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660352"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23218"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1021\/ci600526a"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.003"},{"key":"ref18","article-title":"Network telescopes: Technical report","author":"moore","year":"2004","journal-title":"Department of Computer Science and Engineering"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2497690"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400437"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849283"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23233"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555355"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.05.012"},{"journal-title":"The New York Times 9 Recent Cyberattacks Against Big Businesses","year":"2016","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378945"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.102913.00020"},{"key":"ref22","article-title":"The dark oracle: Perspective-aware unused and unreachable address discovery","volume":"6","author":"cooke","year":"2006","journal-title":"NSDI"},{"year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510881"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177096"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.09.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.005"}],"event":{"name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2017,6,26]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,6,30]]}},"container-title":["2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7975134\/7986245\/07986317.pdf?arnumber=7986317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T16:23:25Z","timestamp":1502900605000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7986317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2017.7986317","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}