{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:55:50Z","timestamp":1725980150005},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319920429"},{"type":"electronic","value":"9783319920436"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92043-6_49","type":"book-chapter","created":{"date-parts":[[2018,6,6]],"date-time":"2018-06-06T07:58:50Z","timestamp":1528271930000},"page":"609-623","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Discovering Significant Co-Occurrences to Characterize Network Behaviors"],"prefix":"10.1007","author":[{"given":"Kristine","family":"Arthur-Durett","sequence":"first","affiliation":[]},{"given":"Thomas E.","family":"Carroll","sequence":"additional","affiliation":[]},{"given":"Satish","family":"Chikkagoudar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,7]]},"reference":[{"issue":"4","key":"49_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1282427.1282383","volume":"37","author":"Paramvir Bahl","year":"2007","unstructured":"Bahl, P., Chandra, R., Greenberg, A., Kandula, S., Maltz, D.A., Zhang, M.: Towards highly reliable enterprise network services via inference of multi-level dependences. In: Proceedings of the ACM SIGCOMM Conference on Data Communications (SIGCOMM), pp. 13\u201324 (2007)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"49_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118619193","volume-title":"Time Series Analysis: Forecasting and Control","author":"GGP Box","year":"2008","unstructured":"Box, G.G.P., Jenkins, G.M., Reinsel, G.C.: Time Series Analysis: Forecasting and Control, 4th edn. Wiley, Hoboken (2008)","edition":"4"},{"key":"49_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-0004-3","volume-title":"Time Series: Theory and Methods","author":"PJ Brockwell","year":"1991","unstructured":"Brockwell, P.J., Davis, R.A.: Time Series: Theory and Methods, 2nd edn. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/978-1-4899-0004-3","edition":"2"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Bruillard, P., Nowak, K., Purvine, E.: Anomaly detection using persistent homology. In: Proceedings of the Cybersecurity Symposium (CYBERSEC). IEEE (2016)","DOI":"10.1109\/CYBERSEC.2016.009"},{"key":"49_CR5","unstructured":"CAIDA: The CAIDA Anonymized Internet Traces 2016 Dataset (2016). http:\/\/data.caida.org\/datasets\/passive-2016\/README-2016.txt. Accessed 29 Mar 2016"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Carroll, T.E., Chikkagoudar, S., Arthur-Durett, K.: Impact of network activity levels on the performance of passive network service dependency discovery. In: Proceedings of the Military Communications Conference (MILCOM), pp. 1341\u20131347. IEEE (2015)","DOI":"10.1109\/MILCOM.2015.7357631"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Carroll, T.E., Chikkagoudar, S., Arthur-Durett, K.M., Thomas, D.G.: Automating network node behavior characterization by mining communication patterns. In: 2017 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/THS.2017.7943510"},{"key":"49_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-319-04918-2_24","volume-title":"Passive and Active Measurement","author":"S Chakravarty","year":"2014","unstructured":"Chakravarty, S., Barbera, M.V., Portokalidis, G., Polychronakis, M., Keromytis, A.D.: On the effectiveness of traffic analysis against anonymity networks using flow records. In: Faloutsos, M., Kuzmanovic, A. (eds.) PAM 2014. LNCS, vol. 8362, pp. 247\u2013257. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04918-2_24"},{"key":"49_CR9","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.physa.2014.07.054","volume":"414","author":"O Erdem","year":"2014","unstructured":"Erdem, O., Ceyhan, E., Varli, Y.: A new correlation coefficient for bivariate time-series data. Phys. A: Stat. Mech. Appl. 414, 274\u2013284 (2014)","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"49_CR10","volume-title":"Numerical Methods for Scientist and Engineers","author":"RW Hamming","year":"1986","unstructured":"Hamming, R.W.: Numerical Methods for Scientist and Engineers, 2nd edn. Dover, New York (1986)","edition":"2"},{"key":"49_CR11","unstructured":"Inacio, C.M., Trammell, B.: YAF: yet another flowmeter. In: Proceedings of the 24th Large Installation System Administration Conference (LISA 2010). USENIX (2010)"},{"key":"49_CR12","unstructured":"Jalali, L., Jain, R.: A framework for event co-occurrence detection in event streams. CoRR abs\/1603.09012 (2016)"},{"key":"49_CR13","unstructured":"Joslyn, C., Cowley, W., Hogan, E., Olsen, B.: Discrete mathematical approaches to graph-based traffic analysis. In: Proceedings of the International Workshop on Engineering Cyber Security and Resilience (ECSaR) (2014)"},{"key":"49_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-88163-3","volume-title":"Self-Organization and Associative Memory","author":"T Kohonen","year":"1987","unstructured":"Kohonen, T.: Self-Organization and Associative Memory, 2nd edn. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/978-3-642-88163-3","edition":"2"},{"key":"49_CR15","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis for Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 183\u2013195. IEEE (2005)"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Natarajan, A., Ning, P., Liu, Y., Jajodia, S., Hutchinson, S.E.: NSDMiner: automated discovery of network service dependencies. In: Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOMM 2012). IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195642"},{"key":"49_CR17","unstructured":"Oler, K., Choudhury, S.: Graph based role mining techniques for cyber security. In: Proceedings of the FloCon. CERT (2015)"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Sayegh, N., Elhajj, I.H., Kayssi, A., Chehab, A.: SCADA intrusion detection system based on temporal behavior of frequent patterns. In: Proceedings of the 17th IEEE Mediterranean Electrotechnical Conference (MELECON). IEEE (2014)","DOI":"10.1109\/MELCON.2014.6820573"},{"key":"49_CR19","unstructured":"Thomas, B.: Teamviewer authentication protocol (part 1 of 3), 31 January 2013. https:\/\/www.optiv.com\/blog\/teamviewer-authentication-protocol-part-1-of-3. Accessed 1 Jan 2018"},{"key":"49_CR20","unstructured":"Thomas, B.: Teamviewer authentication protocol (part 2 of 3), 31 January 2013. https:\/\/www.optiv.com\/blog\/teamviewer-authentication-protocol-part-2-of-3. Accessed 1 Jan 2018"},{"issue":"5","key":"49_CR21","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TPDS.2016.2619715","volume":"28","author":"J Yin","year":"2017","unstructured":"Yin, J., Zhao, X., Tang, Y., Zhi, C., Chen, Z., Wu, Z.: CloudScout: a non-intrusive approach to service dependency discovery. IEEE Trans. Parallel Distrib. Syst. 28(5), 1271\u20131284 (2017)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Interaction, Visualization, and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92043-6_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:13:13Z","timestamp":1710259993000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92043-6_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319920429","9783319920436"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92043-6_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIMI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Interface and the Management of Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Vegas, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"himi2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.hci.international\/himi","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}