{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T19:47:47Z","timestamp":1768679267023,"version":"3.49.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/secpri.2004.1301325","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T14:19:45Z","timestamp":1086877185000},"page":"211-225","source":"Crossref","is-referenced-by-count":295,"title":["Fast portscan detection using sequential hypothesis testing"],"prefix":"10.1109","author":[{"family":"Jaeyeon Jung","sequence":"first","affiliation":[]},{"given":"V.","family":"Paxson","sequence":"additional","affiliation":[]},{"given":"A.W.","family":"Berger","sequence":"additional","affiliation":[]},{"given":"H.","family":"Balakrishnan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2002.1015594"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63859"},{"key":"1","year":"0","journal-title":"Nmap - Free Security Scanner for Network Exploration & Security Audits"},{"key":"7","article-title":"Practical automated detection of stealthy portscans","author":"staniford","year":"2000","journal-title":"Proceedings of the 7th ACM conference on computer and communications security"},{"key":"6","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th Conference on Systems Administration (LISA-99)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194879"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781045"},{"key":"8","author":"wald","year":"1947","journal-title":"Sequential Analysis"}],"event":{"name":"IEEE Symposium on Security and Privacy, 2004. 2004","location":"Berkeley, CA, USA"},"container-title":["IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9120\/28916\/01301325.pdf?arnumber=1301325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T01:55:31Z","timestamp":1489456531000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1301325\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/secpri.2004.1301325","relation":{},"subject":[]}}