{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{“日期部分”:[[2023,9,4]],“日期时间”:“2023-09-04T19:02:28Z”,“时间戳”:1693854148635},“出版商位置”:“柏林,海德堡”,“参考计数”:8,“出版者”:“斯普林格-柏林-海德堡“,”isbn-type“:[{”value“9783642009747”,“type”:“print”},{“value”:“9783642009754”,“type”:“electronic”}],“license”:[{“start”:{“date-parts”:[[2009,1,1]],“date-time”:“2009-01T00:00:00Z”,“timestamp”:1230768000000},“content-version”:“unspecified”,“delay-in-days”:0,“URL”:“http:\/\/www.springer.com\/tdm”},{“tart”:“2009-01-01T00:00:00Z”,“时间戳”:123076800000},“content-version”:“tdm”,“delay-in-days”:0,“URL”:“http://www.springer.com/tdm”}],“content-domain”:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[],”published-print“:{”date-parts“:[2009]]},”DOI“:”10.1007\/978-3642-00975-4_18“,”type“:”book-capter“,”created“:”{“date-part”rts“:[2009,3,30]],“日期时间”:“2009-03-30T08:19:52Z”,“时间戳”:1238401192000},“页面”:“175-184”,“源”:“Crossref”,“is-referenced-by-count”:16,“标题”:[“监控Bittorrent监视器:鸟瞰图”],“前缀”:“10.1007”,《作者》:[{“given”:“Georgos”,“family”:“Siganos”,《sequence》:“first”,“affiliation”:[]},{“Givent”:“Josep M.”,‘family’:“Pujol”,“sequence”:“additional”,“隶属关系”:[]},{“given”:“Pablo”,“family”:“Rodriguez”,“sequence”:“additional”,“affiliation”:[]}],“member”:“297”,“reference”:[{“issue”:“6”,“key”:”18_CR1“,”doi-asserted-by“:”publisher“,“首页”:“1272”,“doi”:“10.1016\/j.comnet.2008.011”,“卷”:“52”,“作者”:“A.Banerjee”,“年份”:“2008”,“非结构化”:“Banerjee,A.,Faloutsos,M.,Bhuyan,L.:p2p战争:有人在监视你的活动。Compute.Netw.\u00a052(6),1272\u20131280(2008)”,“journal-title”:“Compute.Net”},{“key”:“18_CR2”,“unstructured”:“The \u00a 0Pirate Bay.Top 100 torrents per category,\n\n http://thepiratebay.org\/Top”}:“18_CR3”,“非结构化”:“Defrawy,K.E.,Gjoka,M.,Markopoulou,A.:Bottorrent:滥用bittorrent发动ddos攻击。摘自:SRUTI 2007:第三届USENIX研讨会会议记录,减少互联网上不受欢迎的流量,加州圣克拉拉,pp.1\u20136。USENIX Association(2007)“},{“key”:“18_CR4”,“unstructured”:“Dhungel,P.,Di Wu,B.S.,Ross,K.W.:对比特盗贼攻击的测量研究。In:Proc.IPTPS(2008)”},“{”key“:”18_CR5“,”unstructure“:”iBlocklists.iBlocklists,\n\n http:\\/iblocklist.com\/lists.php“}series-title“:“计算机科学课堂讲稿”,“doi-asserted-by”:“publisher”,“first page”:“1”,“doi”:“10.1007\/11599593_1”,《volume-title》:“高级异构网络技术”,“author”:“J.Liang”,年份:“2005”,“unstructured”:“Liang,J.,Naoumov,N.,Ross,K.W.:P2P文件共享系统中的高效黑名单和污染级别评估。收录:Cho,K.,Jacquet,P.(编辑)AINTEC 2005。LNCS,第u00a03837卷,第1\u201321页。Springer,Heidelberg(2005)“},{“key”:“18_CR7”,“unstructured”:“Piatek,M.,Kohno,T.,Krishnamurthy,A.:监控p2p文件共享网络的挑战和方向,或者为什么我的打印机会收到DMCA撤销通知。摘录:第三届USENIX安全热点专题研讨会(HotSec 2008)(2008)”},}Siganos,G.,Rodriguez,P.:APOLLO:通过盗版\u2019s间谍玻璃实现网络透明。正在准备(2009),\n\n http://\/research.tid.es\/georgos\/images\/apollo_client.pdf“}],“container-title”:[“计算机科学课堂讲稿”,“被动和主动网络测量”],“原始标题”:[],“链接”:[{“URL”:“http://\/link.springer.com\/content\/pdf\/10007\/978-3642-00975-4_18”content-type“:”unspecified“,”content-version“:”vor“,”intended-application“:”similarity-checking“}”,“deposed”:{“date-parts”:[[2019,5,19]],“date-time”:“2019-05-19T11:57:46Z”,“timestamp”:155826706000},“score”:1,“resource”:{primary“:”http://link.sprimary.com\/10007\/978-3642-00975-4_18“},”副标题“:[],“短标题”:[]date-parts“:[[2009]]},”ISBN“:[”9783642009747“,”978364 2009754“],”references-count“:8,”URL“:”http://\/dx.doi.org\/10.1007\/978-3642-00975-4_18“,”relation“:{},“ISSN”:[”0302-9743“,”1611-3349“],“ISSN-type”:[{“value”:“0302-974”,“type”:“print”},{“value”:“1611-3344”349“,”type“:”electronic“}],”subject“:[],”published“:{”date-parts“:[[2009]]}}