{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:54:29Z","timestamp":1743119669076,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030797249"},{"type":"electronic","value":"9783030797256"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79725-6_13","type":"book-chapter","created":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T03:46:28Z","timestamp":1624938388000},"page":"131-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Coarse Traffic Classification for High-Bandwidth Connections in a Computer Network Using Deep Learning Techniques"],"prefix":"10.1007","author":[{"given":"Marek","family":"Bolanowski","sequence":"first","affiliation":[]},{"given":"Andrzej","family":"Paszkiewicz","sequence":"additional","affiliation":[]},{"given":"Bartosz","family":"Rumak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65188-0","volume-title":"Network Traffic Anomaly Detection and Prevention, Information","author":"M Bhuyan","year":"2017","unstructured":"Bhuyan, M., Bhattacharyya, D., Kalita, J.: Network Traffic Anomaly Detection and Prevention, Information. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-65188-0"},{"key":"13_CR2","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-030-19501-4_5","volume-title":"Engineering in Dependability of Computer Systems and Networks","author":"A Bialas","year":"2020","unstructured":"Bialas, A., Michalak, M., Flisiuk, B.: Anomaly detection in network traffic security assurance. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) DepCoS-RELCOMEX 2019. AISC, vol. 987, pp. 46\u201356. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-19501-4_5"},{"issue":"5","key":"13_CR3","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1007\/s11276-019-01991-y","volume":"25","author":"M Conti","year":"2019","unstructured":"Conti, M., Lal, C., Mohammadi, R., Rawat, U.: Lightweight solutions to counter DDoS attacks in software defined networking. Wirel. Netw. 25(5), 2751\u20132768 (2019). https:\/\/doi.org\/10.1007\/s11276-019-01991-y","journal-title":"Wirel. Netw."},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"68669","DOI":"10.1109\/ACCESS.2019.2918364","volume":"7","author":"M Ahmed","year":"2019","unstructured":"Ahmed, M.: Intelligent Big Data Summarization for Rare Anomaly detection. IEEE Access 7, 68669\u201368677 (2019)","journal-title":"IEEE Access"},{"key":"13_CR5","unstructured":"Checkpoint Homepage. https:\/\/www.checkpoint.com\/"},{"key":"13_CR6","unstructured":"Palo Alto Networks Homepage. https:\/\/www.paloaltonetworks.com\/"},{"key":"13_CR7","unstructured":"Fortinet Homepage. https:\/\/www.fortinet.com\/"},{"key":"13_CR8","unstructured":"Sourcefire. https:\/\/en.wikipedia.org\/wiki\/Sourcefire"},{"key":"13_CR9","unstructured":"IBM Qradar. https:\/\/www.ibm.com\/pl-pl\/security\/security-intelligence\/qradar"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Hai, H.D., Duong, N.H.: Detecting anomalous network traffic in IoT networks. In: 2019 21st International Conference on Advanced Communication Technology (ICACT), pp. 1143\u20131152. IEEE (2019). https:\/\/doi.org\/10.23919\/ICACT.2019.8702032","DOI":"10.23919\/ICACT.2019.8702032"},{"issue":"61","key":"13_CR11","first-page":"443","volume":"9","author":"M Bolanowski","year":"2015","unstructured":"Bolanowski, M., Twarog, B., Mlicki, R.: Anomalies detection in computer networks with the use of SDN. Meas. Autom. Monit. 9(61), 443\u2013445 (2015)","journal-title":"Meas. Autom. Monit."},{"key":"13_CR12","unstructured":"Bolanowski, M., Paszkiewicz, A.: Methods and means of creating applications to control a complex network environment. In: Scientific Papers of the Polish Information Processing, Society Scientific Council, pp. 151\u2013160 (2017). ISBN 978\u201383\u2013946253-5-1"},{"key":"13_CR13","unstructured":"Lao, R.: Life of Data | Data Science is OSEMN (2017). https:\/\/medium.com\/@randylaosat\/life-of-data-data-science-is-osemn-f453e1febc10"},{"key":"13_CR14","unstructured":"KVM Homepage. https:\/\/www.linux-kvm.org\/page\/Main_Page"},{"key":"13_CR15","unstructured":"Open vSwitch Homepage. https:\/\/www.openvswitch.org\/"},{"issue":"2","key":"13_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.2478\/v10065-012-0044-9","volume":"13","author":"M Bolanowski","year":"2013","unstructured":"Bolanowski, M., Paszkiewicz, A.: Performance test of network devices. Annales Universitatis Mariae Curie-Sklodowska, Sectio Ai Informatica 13(2), 29\u201336 (2013)","journal-title":"Annales Universitatis Mariae Curie-Sklodowska, Sectio Ai Informatica"},{"key":"13_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-99981-4_7","volume-title":"Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology \u2013 ISAT 2018","author":"A Paszkiewicz","year":"2019","unstructured":"Paszkiewicz, A., Iwaniec, K.: Use of ising model for analysis of changes in the structure of the IT network. In: Borzemski, L., \u015awi\u0105tek, J., Wilimowska, Z. (eds.) ISAT 2018. AISC, vol. 852, pp. 65\u201377. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-99981-4_7"},{"key":"13_CR18","unstructured":"Wireshark Homepage. https:\/\/www.wireshark.org\/"},{"key":"13_CR19","unstructured":"Metasploit Homepage. https:\/\/www.metasploit.com\/"},{"key":"13_CR20","first-page":"14","volume":"10","author":"M Bolanowski","year":"2018","unstructured":"Bolanowski, M., Paszkiewicz, A.: Detekcja anomalii w systemach autonomicznych Internetu Rzeczy. Elektronika 10, 14\u201317 (2018)","journal-title":"Elektronika"},{"key":"13_CR21","doi-asserted-by":"publisher","unstructured":"Bolanowski, M., Cislo, P.: The possibility of using LACP protocol in anomaly detection systems. In: Computing in Science and Technology (CST 2018), ITM Wecb Conference, vol. 21 (2018). https:\/\/doi.org\/10.1051\/itmconf\/20182100014","DOI":"10.1051\/itmconf\/20182100014"},{"key":"13_CR22","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-11248-0_19","volume-title":"Analysis and Simulation of Electrical and Computer Systems","author":"M Bolanowski","year":"2015","unstructured":"Bolanowski, M., Paszkiewicz, A.: The use of statistical signatures to detect anomalies in computer network. In: Go\u0142\u0119biowski, L., Mazur, D. (eds.) Analysis and Simulation of Electrical and Computer Systems. LNEE, vol. 324, pp. 251\u2013260. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-11248-0_19"}],"container-title":["Lecture Notes in Networks and Systems","Complex, Intelligent and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79725-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T03:51:10Z","timestamp":1624938670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79725-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030797249","9783030797256"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79725-6_13","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/cisis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}