{"id":"https://openalex.org/W1524576111","doi":"https://doi.org/10.1007/978-3-642-04117-4_12","title":"Distributed Port Scan Detection","display_name":"Distributed Port Scan Detection","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1524576111","doi":"https://doi.org/10.1007/978-3-642-04117-4_12","mag":"1524576111"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-04117-4_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-04117-4_12","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Handbook of Information and Communication Security","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101416537","display_name":"Himanshu Singh","orcid":"https://orcid.org/0000-0003-0360-7417"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Himanshu Singh","raw_affiliation_strings":["Department of Computer Science, San Jose State University, San Jose, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jose State University, San Jose, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047765703","display_name":"Robert Chun","orcid":null},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert Chun","raw_affiliation_strings":["Department of Computer Science, San Jose State University, San Jose, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, San Jose State University, San Jose, CA, USA","institution_ids":["https://openalex.org/I51504820"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101416537"],"corresponding_institution_ids":["https://openalex.org/I51504820"],"apc_list":null,"apc_paid":null,"fwci":1.6489,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82074468,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"221","last_page":"234"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7495558261871338},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.7299538850784302},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6079650521278381},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5704159140586853},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5658409595489502},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.5561733841896057},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5490968823432922},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5479077696800232},{"id":"https://openalex.org/keywords/port","display_name":"Port (circuit theory)","score":0.4973283112049103},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.49593910574913025},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4735873341560364},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4585014283657074},{"id":"https://openalex.org/keywords/packet-processing","display_name":"Packet processing","score":0.4150657653808594},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.41475117206573486},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.41125959157943726},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34210604429244995},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.17857253551483154},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15922388434410095},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1380029320716858},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13230955600738525},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11863258481025696}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7495558261871338},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.7299538850784302},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6079650521278381},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5704159140586853},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5658409595489502},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.5561733841896057},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5490968823432922},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5479077696800232},{"id":"https://openalex.org/C32802771","wikidata":"https://www.wikidata.org/wiki/Q2443617","display_name":"Port (circuit theory)","level":2,"score":0.4973283112049103},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.49593910574913025},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4735873341560364},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4585014283657074},{"id":"https://openalex.org/C2779581428","wikidata":"https://www.wikidata.org/wiki/Q7122997","display_name":"Packet processing","level":3,"score":0.4150657653808594},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.41475117206573486},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.41125959157943726},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34210604429244995},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.17857253551483154},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15922388434410095},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1380029320716858},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13230955600738525},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11863258481025696},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-04117-4_12","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-04117-4_12","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Handbook of Information and Communication Security","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W127460973","https://openalex.org/W570047390","https://openalex.org/W1516506771","https://openalex.org/W1649901946","https://openalex.org/W1674877186","https://openalex.org/W1744212210","https://openalex.org/W1993284846","https://openalex.org/W2009250465","https://openalex.org/W2108303927","https://openalex.org/W2112135709","https://openalex.org/W2114936722","https://openalex.org/W2117002131","https://openalex.org/W2123845384","https://openalex.org/W2133063338","https://openalex.org/W2186294736","https://openalex.org/W4210303156","https://openalex.org/W6631228298"],"related_works":["https://openalex.org/W3129184027","https://openalex.org/W2042324064","https://openalex.org/W4381744925","https://openalex.org/W2047113772","https://openalex.org/W2743409560","https://openalex.org/W3142755774","https://openalex.org/W4290991465","https://openalex.org/W2071891813","https://openalex.org/W33745165","https://openalex.org/W2115775347"],"abstract_inverted_index":null,"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
