{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T23:10:05Z","timestamp":1736377805396,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340720"},{"type":"electronic","value":"9783540340744"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751588_102","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T13:53:45Z","timestamp":1147355625000},"page":"982-988","source":"Crossref","is-referenced-by-count":0,"title":["Automatic Location Detection System for Anomaly Traffic on Wired\/Wireless Networks"],"prefix":"10.1007","author":[{"given":"Ki-Sung","family":"Yu","sequence":"first","affiliation":[]},{"given":"Won-Hyuk","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sung-Jin","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Jin-Wook","family":"Chung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"102_CR1","unstructured":"C\u00e1ceres, R.: Measurements of wide-area Internet traffic. Tech. Rep. UCB\/CSD 89\/550, Computer Science Department, University of California, Berkeley (1989)"},{"key":"102_CR2","doi-asserted-by":"crossref","unstructured":"Paxon, V.: Fast, approximate synthesis of fractional Gaussian noise for generating self-similar network traffic. Computer Communications Review, vol. 27(5) (1997)","DOI":"10.1145\/269790.269792"},{"key":"102_CR3","doi-asserted-by":"crossref","unstructured":"Paxson, V.: Measurements and Analysis of End-to-End Internet Dynamics, Ph.D. thesis, University of California Berkeley (1997)","DOI":"10.2172\/551971"},{"issue":"1","key":"102_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/90.554723","volume":"5","author":"W. Willinger","year":"1997","unstructured":"Willinger, W., Taqqu, M., Sherman, R., Wilson, D.: Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level. IEEE\/ACM Transactions on Networking\u00a05(1), 71\u201386 (1997)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"102_CR5","doi-asserted-by":"crossref","unstructured":"Abry, P., Veitch, D.: Wavelet analysis of long range dependent traffic. IEEE Transactions on Information Theory\u00a044(1) (1998)","DOI":"10.1109\/18.650984"},{"key":"102_CR6","unstructured":"Hood, C., Ji, C.: Proactive network fault detection. In: Proceedings of IEEE INFOCOM 1997, Kobe, Japan (April 1997)"},{"issue":"6","key":"102_CR7","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/90.477721","volume":"3","author":"I. Katzela","year":"1995","unstructured":"Katzela, I., Schwartz, M.: Schemes for fault identification in communications networks. IEEE\/ACM Transactions on Networking\u00a03(6), 753\u2013764 (1995)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"102_CR8","doi-asserted-by":"crossref","unstructured":"Ward, A., Glynn, P., Richardson, K.: Internet service performance failure detection. Performance Evaluation Review (August 1998)","DOI":"10.1145\/306225.306237"},{"key":"102_CR9","unstructured":"Brutlag, J.: Aberrant behavior detection in time series for network monitoring. In: Proceedings of the USENIX Fourteenth System Administration Conference LISA XIV, New Orleans, LA (December 2000)"},{"key":"102_CR10","unstructured":"Barford, P.: A signal Analysis of Network Traffic Anomalies. In: Proceeding of ACM SIGCOMM internet measurement workshop 2002, Zekauskas, M.: A Round-trip Delay Metric for IPPM, RFC 2681, September1999 (1999)"},{"key":"102_CR11","doi-asserted-by":"crossref","unstructured":"LaKhina, A.: Characterization of network-wide anomalies in traffic flows. In: IMC 2004, October 25-27 (2004)","DOI":"10.1145\/1028788.1028813"},{"key":"102_CR12","doi-asserted-by":"crossref","unstructured":"Caberera, J.B.D.: Statistical traffic modeling for network intrusion detection. In: Proceedings, 8th International symposium on modeling, analysis and simulation of computer and telecommunication systems pp. 466\u2013473 (September 2000)","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"102_CR13","unstructured":"Yau, S.S., Zhang, X.: Computer Network Intrusion Detection, Assessment and Prevention based on Security Dependency Relation. In: Proc. of COMPSAC 1999 (1999)"},{"key":"102_CR14","unstructured":"Pao, T.-l.: Netflow based intrusion detection system. In: International Conference on networking, sensing & control, March 21-23 (2004)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751588_102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T22:31:19Z","timestamp":1736375479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751588_102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340720","9783540340744"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11751588_102","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}