{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:42:42Z","timestamp":1729651362896,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/icspcs.2017.8270453","type":"proceedings-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T17:17:02Z","timestamp":1517246222000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Multi-homed device detection using clock skew"],"prefix":"10.1109","author":[{"given":"Bryan","family":"Martin","sequence":"first","affiliation":[]},{"given":"Murali","family":"Tummala","sequence":"additional","affiliation":[]},{"given":"John","family":"McEachen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2013.6496914"},{"journal-title":"Software Defined Network Monitoring Scheme Using Spectral Graph Theory and Phantom Nodes","year":"2014","author":"johnson","key":"ref12"},{"key":"ref13","first-page":"211","article-title":"An improved clockskew measurement technique for revealing hidden services","author":"zander","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503213"},{"journal-title":"Network time protocol (Version 3) specification implementation and analysis","year":"1992","author":"mills","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1323"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2008.4700187"},{"journal-title":"Discrete random signals and statistical signal processing","year":"1992","author":"therrien","key":"ref19"},{"journal-title":"Security Through Penetration Testing[M]","year":"2002","author":"klevinsky","key":"ref4"},{"journal-title":"Handbook of Information Security - Threats Vulnerabilities Prevention Detection and Management","year":"2006","author":"bigdoli","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.26"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TDSC.2005.26","article-title":"Remote physical device fingerprinting","volume":"2","author":"kohno","year":"2005","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"journal-title":"Detecting a Multi-Homed Device Using Clock Skew","year":"2016","author":"martin","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761302"},{"journal-title":"Dual homed machines are the juiciest targets ” Totino Security","year":"2010","author":"byres","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2005.856321"},{"journal-title":"Probability and Random Processes for Electrical and Computer Engineers","year":"2012","author":"tummala","key":"ref20"},{"journal-title":"Spectral graph theory analysis of software-defined networks to improve performance and security","year":"2015","author":"parker","key":"ref21"}],"event":{"name":"2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)","start":{"date-parts":[[2017,12,13]]},"location":"Surfers Paradise, QLD","end":{"date-parts":[[2017,12,15]]}},"container-title":["2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8262702\/8270439\/08270453.pdf?arnumber=8270453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T19:11:33Z","timestamp":1570648293000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8270453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icspcs.2017.8270453","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}