{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:14Z","timestamp":1750307594406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,1,28]],"date-time":"2010-01-28T00:00:00Z","timestamp":1264636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,1,28]]},"DOI":"10.1145\/1712605.1712623","type":"proceedings-article","created":{"date-parts":[[2010,2,2]],"date-time":"2010-02-02T13:33:55Z","timestamp":1265117635000},"page":"93-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Monitoring for security intrusion using performance signatures"],"prefix":"10.1145","author":[{"given":"Alberto","family":"Avritzer","sequence":"first","affiliation":[{"name":"Siemens Corporate Research, Princeton, NJ, USA"}]},{"given":"Rajanikanth","family":"Tanikella","sequence":"additional","affiliation":[{"name":"Siemens Corporate Research, Princeton, NJ, USA"}]},{"given":"Kiran","family":"James","sequence":"additional","affiliation":[{"name":"Siemens Corporate Research, Princeton, NJ, USA"}]},{"given":"Robert G.","family":"Cole","sequence":"additional","affiliation":[{"name":"JHU\/Applied Physics Laboratory, Laurel, MD, USA"}]},{"given":"Elaine","family":"Weyuker","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs - Research, Florham Park, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,1,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.464549"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/850962.854444"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009794200077"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/974044.974046"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071021.1071026"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216993.1217023"},{"key":"e_1_3_2_1_7_1","first-page":"T-22","author":"Diffie W.","year":"1976","unstructured":"W. Diffie and M.E. Hellman , New directions in cryptography. IEEE Transactions on Information Theory , vol I T-22 , Nov 1976 , pp:644--654. W. Diffie and M.E. Hellman, New directions in cryptography. IEEE Transactions on Information Theory, vol IT-22, Nov 1976, pp:644--654.","journal-title":"New directions in cryptography. IEEE Transactions on Information Theory"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_1_9_1","first-page":"381","volume-title":"Proc. Twenty-fifth International Symp. on Fault-Tolerant Computing","author":"Huang Y.","year":"1995","unstructured":"Y. Huang , C. Kintala , N. Kolettis , and N.D. Fulton , Software rejuvenation:Analysis, module and applications . Proc. Twenty-fifth International Symp. on Fault-Tolerant Computing , 1995 , pp. 381 -- 390 . Y. Huang, C. Kintala, N. Kolettis, and N.D. Fulton, Software rejuvenation:Analysis, module and applications. Proc. Twenty-fifth International Symp. on Fault-Tolerant Computing, 1995, pp. 381--390."},{"key":"e_1_3_2_1_10_1","unstructured":"IBM Cryptography Research Group. http:\/\/domino.research.ibm.com\/security  IBM Cryptography Research Group. http:\/\/domino.research.ibm.com\/security"},{"key":"e_1_3_2_1_11_1","volume-title":"The code breakers","author":"Khan D.","year":"1967","unstructured":"D. Khan . The code breakers . Macmillan , 1967 . D. Khan. The code breakers. Macmillan, 1967."},{"key":"e_1_3_2_1_12_1","first-page":"469","volume-title":"International Computer Measurement Group Conference","author":"Mariani R.","year":"2006","unstructured":"R. Mariani . Performance Signature : A qualitative approach to dependence guidance . International Computer Measurement Group Conference , pp 469 -- 474 , 2006 . R. Mariani. Performance Signature: A qualitative approach to dependence guidance. International Computer Measurement Group Conference, pp 469--474, 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 1997 IEEE Information Survivability Workshop","author":"Oppenheimer L","year":"1997","unstructured":"D. L . Oppenheimer and M.R. Martonosi , Performance Signatures: A Mechanism for Intrusion Detection . Proceedings of the 1997 IEEE Information Survivability Workshop , 1997 . http:\/\/www.sysnet.ucsd.edu\/ davidopp\/pubs\/perfsig.html. D.L .Oppenheimer and M.R. Martonosi, Performance Signatures: A Mechanism for Intrusion Detection. Proceedings of the 1997 IEEE Information Survivability Workshop, 1997. http:\/\/www.sysnet.ucsd.edu\/ davidopp\/pubs\/perfsig.html."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/www.wired.com\/threatlevel\/2009\/01\/professedtwitt\/  http:\/\/www.wired.com\/threatlevel\/2009\/01\/professedtwitt\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Snort http:\/\/www.snort.org\/  Snort http:\/\/www.snort.org\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Cain & Abel http:\/\/www.oxid.it\/cain.html  Cain & Abel http:\/\/www.oxid.it\/cain.html"},{"key":"e_1_3_2_1_18_1","unstructured":"Wireshark http:\/\/www.wireshark.org\/  Wireshark http:\/\/www.wireshark.org\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Hyperic Sigar http:\/\/www.hyperic.com\/products\/sigar.html  Hyperic Sigar http:\/\/www.hyperic.com\/products\/sigar.html"},{"key":"e_1_3_2_1_20_1","unstructured":"DoSHttp http:\/\/www.socketsoft.net\/  DoSHttp http:\/\/www.socketsoft.net\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Base http:\/\/base.secureideas.net\/  Base http:\/\/base.secureideas.net\/"},{"key":"e_1_3_2_1_22_1","unstructured":"CurrPorts http:\/\/www.nirsoft.net\/utils\/cports.html  CurrPorts http:\/\/www.nirsoft.net\/utils\/cports.html"},{"key":"e_1_3_2_1_23_1","unstructured":"SysTracer http:\/\/www.blueproject.ro\/systracer  SysTracer http:\/\/www.blueproject.ro\/systracer"}],"event":{"name":"WOSP\/SIPEW'10: First Joint WOSP\/SIPEW International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"San Jose California USA","acronym":"WOSP\/SIPEW'10"},"container-title":["Proceedings of the first joint WOSP\/SIPEW international conference on Performance engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1712605.1712623","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1712605.1712623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:35Z","timestamp":1750250495000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1712605.1712623"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,28]]},"references-count":23,"alternative-id":["10.1145\/1712605.1712623","10.1145\/1712605"],"URL":"https:\/\/doi.org\/10.1145\/1712605.1712623","relation":{},"subject":[],"published":{"date-parts":[[2010,1,28]]},"assertion":[{"value":"2010-01-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}