{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:59Z","timestamp":1750307579152,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656116","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"1056-1060","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["TCP portscan detection based on single packet flows and entropy"],"prefix":"10.1145","author":[{"given":"Hai","family":"Zhang","sequence":"first","affiliation":[{"name":"South China University of Technology, Guangzhou, China and Southern Medical University, Guangzhou, China"}]},{"given":"Xuyang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Southern Medical University, Guangzhou, China"}]},{"given":"Wenming","family":"Guo","sequence":"additional","affiliation":[{"name":"Southern Medical University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USA","author":"Jung J.","year":"2004","unstructured":"J. Jung , V. Paxson , A. W. Berger , and H. Balakrishnan , \" Fast Portscan Detection Using Sequential Hypothesis Testing,\" in Proc. of 2004 IEEE Symposium on Security and Privacy, Oakland, CA , USA , May 2004 . J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, \"Fast Portscan Detection Using Sequential Hypothesis Testing,\" in Proc. of 2004 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Phoenix","author":"Sridharan A.","year":"2006","unstructured":"A. Sridharan , T. Ye , and S. Bhattacharyya , \" Connection Port Scan Detection on the Backbone,\" in Malware Workshop held in conjunction with IPCC , Phoenix , Arizona, USA , April 2006 . A. Sridharan, T. Ye, and S. Bhattacharyya, \"Connection Port Scan Detection on the Backbone,\" in Malware Workshop held in conjunction with IPCC, Phoenix, Arizona, USA, April 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080112"},{"key":"e_1_3_2_1_5_1","unstructured":"\"Snort \" http:\/\/www.snort.org  \"Snort \" http:\/\/www.snort.org"},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"2","article-title":"Practical automated detection of stealthy portscans","volume":"10","author":"Staniford S.","year":"2002","unstructured":"S. Staniford , J. A. Hoagland , and J. M. McAlerney , \" Practical automated detection of stealthy portscans ,\" J. of Computer Security , vol. 10 , no. 1 -- 2 , pp. 105--136, 2002 . S. Staniford, J. A. Hoagland, and J. M. McAlerney, \"Practical automated detection of stealthy portscans,\" J. of Computer Security, vol. 10, no.1--2, pp. 105--136, 2002.","journal-title":"J. of Computer Security"},{"key":"e_1_3_2_1_7_1","volume-title":"USA","author":"Xu K.","year":"2005","unstructured":"K. Xu , Z.-L. Zhang , and S. Bhattacharyya , \" Reducing Unwanted Traffic in a Backbone Network,\" in Proc. of SRUTI'05, Cambridge, MA , USA , July . 2005 . K. Xu, Z.-L. Zhang, and S. Bhattacharyya, \"Reducing Unwanted Traffic in a Backbone Network,\" in Proc. of SRUTI'05, Cambridge, MA, USA, July. 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000206"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637225"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948235"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015495"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. IEEE International Conference on Communications (ICC'03)","author":"Choi B.-Y.","year":"2003","unstructured":"B.-Y. Choi , J. Park , and Z.-L. Zhang , \" Adaptive Random Sampling for Traffic Load Measurement ,\" in Proc. IEEE International Conference on Communications (ICC'03) , Anchorage, Alaska, USA , May 2003 . B.-Y. Choi, J. Park, and Z.-L. Zhang, \"Adaptive Random Sampling for Traffic Load Measurement,\" in Proc. IEEE International Conference on Communications (ICC'03), Anchorage, Alaska, USA, May 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005699"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.324"},{"key":"e_1_3_2_1_16_1","volume-title":"Statistical Science","author":"Duffield N. G.","year":"2004","unstructured":"N. G. Duffield , \" Sampling for Passive Internet Measurement : A Review \", Statistical Science , 2004 , to appear N. G. Duffield, \"Sampling for Passive Internet Measurement: A Review\", Statistical Science, 2004, to appear"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:13Z","timestamp":1750250473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":14,"alternative-id":["10.1145\/1655925.1656116","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656116","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}