{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:36:58Z","timestamp":1759333018475},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/lcn.2013.6761302","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T18:14:59Z","timestamp":1394734499000},"page":"647-654","source":"Crossref","is-referenced-by-count":13,"title":["IP agnostic real-time traffic filtering and host identification using TCP timestamps"],"prefix":"10.1109","author":[{"given":"Georg","family":"Wicherski","sequence":"first","affiliation":[]},{"given":"Florian","family":"Weingarten","sequence":"additional","affiliation":[]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2009","author":"lyon","journal-title":"Nmap Network Scanning The Official Nmap Project Guide to Network Discovery and Security Scanning","key":"19"},{"key":"22","article-title":"Tcp extensions for high performance","author":"jacobson","year":"1992","journal-title":"RFC 1323 (Proposed Standard) Internet Engineering Task Force"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1016\/j.diin.2008.12.002"},{"key":"23","article-title":"Peering through the shroud: The effect of edge opacity on ip-based client identification","author":"casado","year":"2007","journal-title":"Proc USENIX NSDI'07"},{"year":"2011","author":"zalewski","journal-title":"P0f-Dr Jekyll had something to Hyde-passive OS fingerprinting tool","key":"18"},{"key":"15","article-title":"Detecting private address space based on application layer information","author":"zhao","year":"2006","journal-title":"First IEEE Workshop on Adaptive Policy-based Management in Network Management and Control"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1007\/11807964_97"},{"year":"2011","journal-title":"OpenBSD Programmer's Manual-pf Conf manpage","key":"13"},{"key":"14","article-title":"A robust classifier for passive tcp\/ip fingerprinting","author":"beverly","year":"2004","journal-title":"Proceedings of the PAM Workshop"},{"year":"2007","journal-title":"ENS Cachan France","article-title":"Time has something to tell us about network address translation","key":"11"},{"key":"12","article-title":"W32.Witty.Worm","author":"chien","year":"2004","journal-title":"Symantec security advisory"},{"key":"21","article-title":"An improved clock-skew measurement technique for revealing hidden services","author":"zander","year":"2008","journal-title":"Proceedings of the USENIX Security Symposium"},{"year":"2011","author":"phaal","journal-title":"Detecting NAT Devices using sFlow","key":"3"},{"key":"20","article-title":"Tcp timestamping and remotely gathering uptime information","author":"mcdanel","year":"2001","journal-title":"Bugtraq mailing list"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1016\/0376-5075(81)90003-9"},{"key":"1","article-title":"The ip network address translator (nat","author":"egevang","year":"1994","journal-title":"RFC 1631 Internet Engineering Task Force"},{"key":"10","article-title":"Tcp timestamp to count hosts behind nat","author":"bursztein","year":"2005","journal-title":"Phrack Magazine issue 63 article 0x03-2"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/1179542.1179554"},{"key":"6","article-title":"Inferring the extent of network address port translation at public\/private internet boundaries","author":"armitage","year":"2002","journal-title":"Centre for Advanced Internet Architectures (CAIA)"},{"key":"5","article-title":"Nat usage in residential broadband networks","author":"maier","year":"2011","journal-title":"Proceedings of PAM'11"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1658997.1659010"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/SP.2005.18"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/637201.637243"}],"event":{"name":"38th Annual IEEE Conference on Local Computer Networks (LCN 2013)","start":{"date-parts":[[2013,10,21]]},"location":"Sydney, NSW","end":{"date-parts":[[2013,10,24]]}},"container-title":["38th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745315\/6761208\/06761302.pdf?arnumber=6761302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T18:15:36Z","timestamp":1490292936000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6761302\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/lcn.2013.6761302","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}