{"created":"2021-03-01T06:17:32.903378+00:00","id":994,"links":{},"metadata":{"_buckets":{"deposit":"eeb2ae35-887b-4eaf-8d8b-78b9ece55b77"},"_deposit":{"id":"994","owners":[],"pid":{"revision_id":0,"type":"depid","value":"994"},"status":"published"},"_oai":{"id":"oai:repository.dl.itc.u-tokyo.ac.jp:00000994","sets":["110:111:243","9:233:234"]},"item_7_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"IP Traceback based on the Statistical Analysis of Marked Packets -Detection of Submarine Nodes and Discrimination between Attackers Legitimate Users-"}]},"item_7_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2005-03","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_7_date_granted_25":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2005-03"}]},"item_7_description_11":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_7_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"4034","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Sokawa, Takahiro"}]}]},"item_7_select_21":{"attribute_name":"学位","attribute_value_mlt":[{"subitem_select_item":"master"}]},"item_7_subject_13":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007.68","subitem_subject_scheme":"NDC"}]},"item_7_text_24":{"attribute_name":"研究科・専攻","attribute_value_mlt":[{"subitem_text_value":"新領域創成科学研究科基盤情報学専攻"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"曽小川, 貴裕"}],"nameIdentifiers":[{"nameIdentifier":"4033","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-05-31"}],"displaytype":"detail","filename":"K-00170.pdf","filesize":[{"value":"6.9 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文(fulltext)","url":"https://repository.dl.itc.u-tokyo.ac.jp/record/994/files/K-00170.pdf"},"version_id":"5d1e2733-c094-4bcd-8db2-f3e0ff812aa4"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"IP","subitem_subject_scheme":"Other"},{"subitem_subject":"検索","subitem_subject_scheme":"Other"},{"subitem_subject":"マークパケット","subitem_subject_scheme":"Other"},{"subitem_subject":"統計","subitem_subject_scheme":"Other"},{"subitem_subject":"逆検索","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"thesis","resourceuri":"http://purl.org/coar/resource_type/c_46ec"}]},"item_title":"マークパケットの統計処理によるIP経路逆探索 : サブマリンノードの検出及び正悪ユーザの判別","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"マークパケットの統計処理によるIP経路逆探索 : サブマリンノードの検出及び正悪ユーザの判別"}]},"item_type_id":"7","owner":"1","path":["234","243"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-08-08"},"publish_date":"2011-08-08","publish_status":"0","recid":"994","relation_version_is_last":true,"title":["マークパケットの統計処理によるIP経路逆探索 : サブマリンノードの検出及び正悪ユーザの判別"],"weko_creator_id":"1","weko_shared_id":null},"updated":"2022-12-19T03:42:13.466718+00:00"}