{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:43:15Z","timestamp":1729662195727,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/trustcom.2011.25","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T21:41:25Z","timestamp":1325886085000},"page":"173-180","source":"Crossref","is-referenced-by-count":4,"title":["Forecasting the Distribution of Network Traffic for Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Christian","family":"Callegari","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Giordano","sequence":"additional","affiliation":[]},{"given":"Michele","family":"Pagano","sequence":"additional","affiliation":[]},{"given":"Teresa","family":"Pepe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1990.10484583"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/762471.762473"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50019-X"},{"key":"13","first-page":"124","article-title":"A neural network approach towards intrusion detection","volume":"1","author":"fox","year":"1990","journal-title":"Proceedings of the National Computer Security Conference Information Systems Security Standards - The Key to the Future"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365067"},{"key":"11","first-page":"21","article-title":"Change (detection) you can believe in: Finding distributional shifts in data streams","author":"dasu","year":"2009","journal-title":"IDA"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"20","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/978-3-540-45248-5_13","article-title":"An analysis of the 1999 DARPA\/Lincoln laboratory evaluation data for network anomaly detection","author":"mahoney","year":"2003","journal-title":"Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1561\/0400000002"},{"key":"24","first-page":"234","article-title":"Sketch-based change detection: Methods, evaluation, and applications","author":"subhabrata","year":"2003","journal-title":"Proc Internet Measurement Conference (IMC'03)"},{"key":"25","first-page":"615","article-title":"Tabulation based 4-universal hashing with applications to second moment estimation","author":"thorup","year":"2004","journal-title":"Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'06)"},{"key":"26","article-title":"Supporting intrusion detection by graph clustering and graph drawing","author":"tolle","year":"2000","journal-title":"Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID)"},{"key":"27","article-title":"A Markov chain model of temporal behavior for anomaly detection","author":"ye","year":"0","journal-title":"Proceedings of the Workshop on Information Assurance and Security 2000"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028802"},{"journal-title":"Time Series Analysis Forecasting and Control","year":"1990","author":"box","key":"3"},{"journal-title":"The Internet2 Network","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50048-3"},{"journal-title":"Flow-Tools Home Page","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061325"},{"key":"6","article-title":"Cisco Systems NetFlow Services Export","volume":"3954","author":"claise","year":"2004","journal-title":"RFC"},{"key":"5","first-page":"693","article-title":"Finding frequent items in data streams","author":"charikar","year":"2002","journal-title":"Proceedings of the Very Large Data Bases Conference (VLDB)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISABEL.2010.5702782"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354567"}],"event":{"name":"2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2011,11,16]]},"location":"Changsha, China","end":{"date-parts":[[2011,11,18]]}},"container-title":["2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6120120\/6120777\/06120817.pdf?arnumber=6120817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T12:24:10Z","timestamp":1497961450000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6120817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2011.25","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}