{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:06Z","timestamp":1730211666681,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/csnet.2017.8241999","type":"proceedings-article","created":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T16:31:33Z","timestamp":1514824293000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["Collecting and characterizing a real broadband access network traffic dataset"],"prefix":"10.1109","author":[{"given":"Martin Andreoni","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Renato Souza","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Igor D.","family":"Alvarenga","sequence":"additional","affiliation":[]},{"given":"Gabriel A. F.","family":"Rebello","sequence":"additional","affiliation":[]},{"given":"Igor J.","family":"Sanz","sequence":"additional","affiliation":[]},{"given":"Antonio G. P.","family":"Lobato","sequence":"additional","affiliation":[]},{"given":"Diogo M. F.","family":"Mattos","sequence":"additional","affiliation":[]},{"given":"Otto C. M. B.","family":"Duarte","sequence":"additional","affiliation":[]},{"given":"Guy","family":"Pujolle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"NSL-KDD","article-title":"NSL-KDD data set for network-based intrusion detection systems","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref12","article-title":"An accurate threat detection system through real-time stream processing","author":"lobato","year":"2016","journal-title":"Grupo de Teleinformática e Autornação (GTA) Universidade Federal do Rio de Janeiro (UFRJ) Tech Rep GTA-16-080"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0124472"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195548"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600317WC"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0505-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.103"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.63"},{"journal-title":"CAIDA","article-title":"Supporting research and development of security technologies through network and security data collection","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2546240"},{"key":"ref2","first-page":"1","article-title":"Computer and internet use in the united states: 2013","author":"file","year":"2013","journal-title":"United States Census Bureau"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.75"},{"key":"ref1","article-title":"Síntese de indicadores sociais: uma análise das condições de vida da população brasileira","volume":"36","year":"2016","journal-title":"Rio de Janeiro"},{"key":"ref20","first-page":"1","article-title":"Modeling network traffic for traffic matrix estimation and anomaly detection based on bayesian network in cloud computing networks","author":"nie","year":"2016","journal-title":"Annals of Telecommunications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)30026-X"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.45"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7011"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.08.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.4.4.304-314"},{"key":"ref25","first-page":"229","article-title":"SNORT: Lightweight intrusion detection for networks","volume":"99","author":"roesch","year":"1999","journal-title":"LISA"}],"event":{"name":"2017 1st Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2017,10,18]]},"location":"Rio de Janeiro","end":{"date-parts":[[2017,10,20]]}},"container-title":["2017 1st Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8231154\/8241982\/08241999.pdf?arnumber=8241999","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T17:31:48Z","timestamp":1517851908000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8241999\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csnet.2017.8241999","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}