{"id":"https://openalex.org/W2532241363","doi":"https://doi.org/10.1109/wifs.2010.5711462","title":"Similarity coefficient generators for network forensics","display_name":"Similarity coefficient generators for network forensics","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2532241363","doi":"https://doi.org/10.1109/wifs.2010.5711462","mag":"2532241363"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2010.5711462","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2010.5711462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Workshop on Information Forensics and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064359992","display_name":"A. Telidevara","orcid":null},"institutions":[{"id":"https://openalex.org/I4819740","display_name":"Sri Sathya Sai Institute of Higher Learning","ror":"https://ror.org/05arzt710","country_code":"IN","type":"education","lineage":["https://openalex.org/I4819740"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"A. Telidevara","raw_affiliation_strings":["Sri Sathya Sai Institute of Higher Learning, Anantapur, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Sri Sathya Sai Institute of Higher Learning, Anantapur, Andhra Pradesh, India","institution_ids":["https://openalex.org/I4819740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111562065","display_name":"V. Chandrasekaran","orcid":null},"institutions":[{"id":"https://openalex.org/I4819740","display_name":"Sri Sathya Sai Institute of Higher Learning","ror":"https://ror.org/05arzt710","country_code":"IN","type":"education","lineage":["https://openalex.org/I4819740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. Chandrasekaran","raw_affiliation_strings":["Sri Sathya Sai Institute of Higher Learning, Anantapur, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Sri Sathya Sai Institute of Higher Learning, Anantapur, Andhra Pradesh, India","institution_ids":["https://openalex.org/I4819740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054208672","display_name":"A. Srinivasan","orcid":"https://orcid.org/0000-0002-1756-0843"},"institutions":[{"id":"https://openalex.org/I190816365","display_name":"Bloomsburg University","ror":"https://ror.org/007dga614","country_code":"US","type":"education","lineage":["https://openalex.org/I190816365"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. Srinivasan","raw_affiliation_strings":["Bloomsburg University, Bloomsburg, PA, USA"],"affiliations":[{"raw_affiliation_string":"Bloomsburg University, Bloomsburg, PA, USA","institution_ids":["https://openalex.org/I190816365"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035065105","display_name":"Ravi Mukkamala","orcid":"https://orcid.org/0000-0001-6323-9789"},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Mukkamala","raw_affiliation_strings":["Old Dominion University, Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"Old Dominion University, Norfolk, VA, USA","institution_ids":["https://openalex.org/I81365321"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070806134","display_name":"S. Gampa","orcid":null},"institutions":[{"id":"https://openalex.org/I81365321","display_name":"Old Dominion University","ror":"https://ror.org/04zjtrb98","country_code":"US","type":"education","lineage":["https://openalex.org/I81365321"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Gampa","raw_affiliation_strings":["Old Dominion University, Norfolk, VA, USA"],"affiliations":[{"raw_affiliation_string":"Old Dominion University, Norfolk, VA, USA","institution_ids":["https://openalex.org/I81365321"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5064359992"],"corresponding_institution_ids":["https://openalex.org/I4819740"],"apc_list":null,"apc_paid":null,"fwci":1.0684,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80715615,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.9413740038871765},{"id":"https://openalex.org/keywords/jaccard-index","display_name":"Jaccard index","score":0.893104076385498},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7450898289680481},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6729528307914734},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.6546491980552673},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5474201440811157},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5303429365158081},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47558724880218506},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.472615510225296},{"id":"https://openalex.org/keywords/metrics","display_name":"Metrics","score":0.4419286549091339},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.4374789595603943},{"id":"https://openalex.org/keywords/similarity-measure","display_name":"Similarity measure","score":0.43225646018981934},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3833957612514496},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.3391163945198059},{"id":"https://openalex.org/keywords/routing-table","display_name":"Routing table","score":0.3184938430786133},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.15245845913887024},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1438261866569519}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.9413740038871765},{"id":"https://openalex.org/C203519979","wikidata":"https://www.wikidata.org/wiki/Q865360","display_name":"Jaccard index","level":3,"score":0.893104076385498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7450898289680481},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6729528307914734},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.6546491980552673},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5474201440811157},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5303429365158081},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47558724880218506},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.472615510225296},{"id":"https://openalex.org/C195780805","wikidata":"https://www.wikidata.org/wiki/Q1535986","display_name":"Metrics","level":5,"score":0.4419286549091339},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.4374789595603943},{"id":"https://openalex.org/C2776517306","wikidata":"https://www.wikidata.org/wiki/Q29017317","display_name":"Similarity measure","level":2,"score":0.43225646018981934},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3833957612514496},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3391163945198059},{"id":"https://openalex.org/C184896649","wikidata":"https://www.wikidata.org/wiki/Q290066","display_name":"Routing table","level":4,"score":0.3184938430786133},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.15245845913887024},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1438261866569519},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wifs.2010.5711462","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2010.5711462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Workshop on Information Forensics and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1967949770","https://openalex.org/W2012019886","https://openalex.org/W2033350458","https://openalex.org/W2099842512","https://openalex.org/W2111295912","https://openalex.org/W2119030343","https://openalex.org/W2119613543","https://openalex.org/W2123845384","https://openalex.org/W2135708813","https://openalex.org/W2148914579","https://openalex.org/W2150228605","https://openalex.org/W2154602876","https://openalex.org/W2414043537","https://openalex.org/W2534766289","https://openalex.org/W4236793779","https://openalex.org/W6675150259","https://openalex.org/W6715422471"],"related_works":["https://openalex.org/W2084099224","https://openalex.org/W2612383974","https://openalex.org/W3123940961","https://openalex.org/W2039534730","https://openalex.org/W2122011234","https://openalex.org/W2151474089","https://openalex.org/W2171272270","https://openalex.org/W2382981078","https://openalex.org/W2975489034","https://openalex.org/W1027493533"],"abstract_inverted_index":{"IP":[0,13],"spoofing":[1],"is":[2,50,83,161,167,188],"one":[3],"of":[4,18,22,32,105,120,139],"the":[5,20,29,47,53,95,103,118,137,144,154,175,185,192],"most":[6],"common":[7],"network":[8],"threats":[9],"today.":[10],"While":[11],"current":[12],"Traceback":[14],"techniques":[15],"are":[16,26],"capable":[17],"identifying":[19],"source":[21],"a":[23,58,67,72,84,89,168,179],"message,":[24],"they":[25],"limited":[27],"by":[28],"huge":[30],"number":[31],"messages":[33,54],"that":[34,78,159,182],"routers":[35],"have":[36],"to":[37,39,45,51,69,86,152],"store":[38,52],"provide":[40],"this":[41,109],"facility.":[42],"One":[43],"way":[44],"reduce":[46],"storage":[48],"overhead":[49],"as":[55],"indices":[56],"in":[57,102,117],"Bloom":[59,64,106,123,127],"filter.":[60],"Current":[61],"systems":[62],"use":[63],"filters":[65,124],"at":[66],"router":[68],"know":[70,87],"if":[71,88],"given":[73],"message":[74,91],"has":[75,92],"gone":[76],"through":[77,94],"router.":[79,96],"However,":[80],"often":[81],"there":[82],"need":[85],"similar":[90],"traversed":[93],"This":[97],"calls":[98],"for":[99],"similarity":[100,114,141,146],"measures":[101,115,142],"context":[104,119],"filters.":[107],"In":[108],"paper,":[110],"we":[111],"develop":[112],"such":[113],"(coefficients)":[116],"two":[121],"specialized":[122],"\u2014":[125],"Hierarchical":[126],"filter":[128],"(HBF)":[129],"and":[130,165,187],"Winnowing":[131],"Block":[132],"Shingling":[133],"(WBS).":[134],"We":[135,177],"compare":[136],"efficacy":[138],"these":[140],"with":[143],"Jaccard":[145,171],"coefficient.":[147],"Simulations":[148],"were":[149],"carried":[150],"out":[151],"evaluate":[153],"measures.":[155,194],"The":[156],"results":[157],"indicate":[158],"HBF-measure":[160],"an":[162],"optimistic":[163],"metric":[164,181],"WBS-similarity":[166],"pessimistic":[169],"measure.":[170],"measure":[172],"falls":[173],"between":[174],"two.":[176],"propose":[178],"weighted":[180],"combines":[183],"all":[184],"metrics":[186],"more":[189],"flexible":[190],"than":[191],"individual":[193]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
