{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T02:47:29Z","timestamp":1768704449108,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,24]],"date-time":"2007-10-24T00:00:00Z","timestamp":1193184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,24]]},"DOI":"10.1145\/1298306.1298316","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"77-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["A brief history of scanning"],"prefix":"10.1145","author":[{"given":"Mark","family":"Allman","sequence":"first","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"International Computer Science Institute, Berkeley, CA"}]},{"given":"Jeff","family":"Terrell","sequence":"additional","affiliation":[{"name":"University of North Carolina Chapel Hill, Chapel Hill, NC"}]}],"member":"320","published-online":{"date-parts":[[2007,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Internet storm center. http:\/\/www.dshield.org.  Internet storm center. http:\/\/www.dshield.org."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. NDSS","author":"Bailey M.","year":"2005","unstructured":"M. Bailey , E. Cooke , F. Jahanian , J. Nazario , and D. Watson . The Internet motion sensor: A distributed blackhole monitoring system . In Proc. NDSS , 2005 . M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The Internet motion sensor: A distributed blackhole monitoring system. In Proc. NDSS, 2005."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029627"},{"key":"e_1_3_2_1_4_1","volume-title":"Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy","author":"Jung J.","year":"2004","unstructured":"J. Jung , V. Paxson , A. W. Berger , and H. Balakrishnan . Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy , 2004 . J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73614-1_10"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2002.1015594"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637244"},{"key":"e_1_3_2_1_8_1","volume-title":"Network telescopes. Technical report","author":"Moore D.","year":"2004","unstructured":"D. Moore , C. Shannon , G. Voelker , and S. Savage . Network telescopes. Technical report , Cooperative Association for Internet Data Analysis (CAIDA) , July 2004 . D. Moore, C. Shannon, G. Voelker, and S. Savage. Network telescopes. Technical report, Cooperative Association for Internet Data Analysis (CAIDA), July 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 10th USENIX Security Symposium. USENIX","author":"Moore D.","year":"2001","unstructured":"D. Moore , G. Voelker , and S. Savage . Interring Internet Denial-of-Service Activity . In Proceedings of the 10th USENIX Security Symposium. USENIX , August 2001 . D. Moore, G. Voelker, and S. Savage. Interring Internet Denial-of-Service Activity. In Proceedings of the 10th USENIX Security Symposium. USENIX, August 2001."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"e_1_3_2_1_11_1","volume-title":"Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium","author":"Paxson V.","year":"1998","unstructured":"V. Paxson . Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium , Jan. 1998 . V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proceedings of the 7th USENIX Security Symposium, Jan. 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781045"}],"event":{"name":"IMC07: Internet Measurement Conference","location":"San Diego California USA","acronym":"IMC07","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 7th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298306.1298316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1298306.1298316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:08Z","timestamp":1750254968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1298306.1298316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,24]]},"references-count":12,"alternative-id":["10.1145\/1298306.1298316","10.1145\/1298306"],"URL":"https:\/\/doi.org\/10.1145\/1298306.1298316","relation":{},"subject":[],"published":{"date-parts":[[2007,10,24]]},"assertion":[{"value":"2007-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}