{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:20:02Z","timestamp":1725553202821},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344780"},{"type":"electronic","value":"9783540344797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760146_107","type":"book-chapter","created":{"date-parts":[[2006,5,9]],"date-time":"2006-05-09T11:29:38Z","timestamp":1147174178000},"page":"726-727","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Detection of Excessive Network Traffic Based on Ratio and Volume Analysis"],"prefix":"10.1007","author":[{"given":"Hyun Joo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jung C.","family":"Na","sequence":"additional","affiliation":[]},{"given":"Jong S.","family":"Jang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"107_CR1","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., et al.: A Signal Analysis of Network Traffic Anomalies. In: Proceedings of ACM SIGCOMM Internet Measurement Workshop, France (November 2002)","DOI":"10.1145\/637201.637210"},{"key":"107_CR2","unstructured":"Lee, S.H., Kim, H.J., Na, J.C., et al.: Abnormal Traffic Detection and Its Implementation. In: ICACT 2005, February 21-23 (2005)"},{"key":"107_CR3","unstructured":"Kim, S.S., Narasimha Reddy, A.L., Vannucci, M.: Detecting Traffic Anomalies at the Source through aggregate analysis of packet header data. In: TAMU-ECE-2003-03 (2003)"},{"key":"107_CR4","doi-asserted-by":"crossref","unstructured":"Barford, P., Plonka, D.: Characteristics of network traffic flow anomalies. In: Proceedings of ACM SIGCOMM Internet Measurement Workshop, Francisco, CA (November 2001)","DOI":"10.1145\/505202.505211"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760146_107.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:07:53Z","timestamp":1619492873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760146_107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344780","9783540344797"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/11760146_107","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}