{"_id":"wQZxvsYnmXJxZYAXM","bibbaseid":"afek-bremlerbarr-feibish-automatedsignatureextractionforhighvolumeattacks-2013","author_short":["Afek, Y.","Bremler-Barr, A.","Feibish, S. L."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2015-06-02T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Afek"],"firstnames":["Yehuda"],"suffixes":[]},{"propositions":[],"lastnames":["Bremler-Barr"],"firstnames":["Anat"],"suffixes":[]},{"propositions":[],"lastnames":["Feibish"],"firstnames":["Shir","Landau"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2244037146f31602531bb8c897b22db63/dblp","booktitle":"ANCS","crossref":"conf/ancs/2013","ee":"http://dl.acm.org/citation.cfm?id=2537884","interhash":"d252e62e3e6a2de4304466bce646179f","intrahash":"244037146f31602531bb8c897b22db63","isbn":"978-1-4799-1640-5","keywords":"dblp","pages":"147-156","publisher":"IEEE Computer Society","timestamp":"2015-06-18T21:57:06.000+0200","title":"Automated signature extraction for high volume attacks.","url":"http://dblp.uni-trier.de/db/conf/ancs/ancs2013.html#AfekB13","year":"2013","bibtex":"@inproceedings{conf/ancs/AfekB13,\n added-at = {2015-06-02T00:00:00.000+0200},\n author = {Afek, Yehuda and Bremler-Barr, Anat and Feibish, Shir Landau},\n biburl = {https://www.bibsonomy.org/bibtex/2244037146f31602531bb8c897b22db63/dblp},\n booktitle = {ANCS},\n crossref = {conf/ancs/2013},\n ee = {http://dl.acm.org/citation.cfm?id=2537884},\n interhash = {d252e62e3e6a2de4304466bce646179f},\n intrahash = {244037146f31602531bb8c897b22db63},\n isbn = {978-1-4799-1640-5},\n keywords = {dblp},\n pages = {147-156},\n publisher = {IEEE Computer Society},\n timestamp = {2015-06-18T21:57:06.000+0200},\n title = {Automated signature extraction for high volume attacks.},\n url = {http://dblp.uni-trier.de/db/conf/ancs/ancs2013.html#AfekB13},\n year = 2013\n}\n\n","author_short":["Afek, Y.","Bremler-Barr, A.","Feibish, S. L."],"key":"conf/ancs/AfekB13","id":"conf/ancs/AfekB13","bibbaseid":"afek-bremlerbarr-feibish-automatedsignatureextractionforhighvolumeattacks-2013","role":"author","urls":{"Link":"http://dl.acm.org/citation.cfm?id=2537884","Paper":"http://dblp.uni-trier.de/db/conf/ancs/ancs2013.html#AfekB13"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Landau?items=1000","dataSources":["2Mbw2PT5CoNiwZHYd"],"keywords":["dblp"],"search_terms":["automated","signature","extraction","high","volume","attacks","afek","bremler-barr","feibish"],"title":"Automated signature extraction for high volume attacks.","year":2013}