{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:40Z","timestamp":1763468200432},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066073"},{"type":"electronic","value":"9783319066080"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06608-0_1","type":"book-chapter","created":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T21:40:40Z","timestamp":1399498840000},"page":"1-14","source":"Crossref","is-referenced-by-count":18,"title":["MalSpot: Multi2 Malicious Network Behavior Patterns Analysis"],"prefix":"10.1007","author":[{"given":"Hing-Hao","family":"Mao","sequence":"first","affiliation":[]},{"given":"Chung-Jung","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Evangelos E.","family":"Papalexakis","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]},{"given":"Kuo-Chen","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Tien-Cheu","family":"Kao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Dainotti, A.: Analysis of a \u201c\/0\u201d stealth scan from a botnet. In: IMC 2012 (2012)","DOI":"10.1145\/2398776.2398778"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Sun, J., Papadimitriou, S., Yu, P.S.: Window-based tensor analysis on high-dimensional and multi-aspect streams. In: ICDM, pp. 1076\u20131080 (2006)","DOI":"10.1109\/ICDM.2006.169"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Maruhashi, K., Guo, F., Faloutsos, C.: Multiaspectforensics: Pattern mining on large-scale heterogeneous networks with tensor analysis. In: ASONAM 2011 (2011)","DOI":"10.1109\/ASONAM.2011.80"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2494091.2494095","volume-title":"Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp 2013 Adjunct","author":"Y. Kishino","year":"2013","unstructured":"Kishino, Y., Sakurai, Y., Yanagisawa, Y., Suyama, T., Naya, F.: Svd-based hierarchical data gathering for environmental monitoring. In: Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication, UbiComp 2013 Adjunct, pp. 9\u201312. ACM, New York (2013)"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"T.G. Kolda","year":"2009","unstructured":"Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Review\u00a051(3), 455\u2013500 (2009)","journal-title":"SIAM Review"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Kolda, T., Sun, J.: Scalable tensor decompositions for multi-aspect data mining. In: ICDM (2008)","DOI":"10.1109\/ICDM.2008.89"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Koutra, D., Papalexakis, E.E., Faloutsos, C.: Tensorsplat: Spotting latent anomalies in time. In: 2012 16th Panhellenic Conference on Informatics (PCI), pp. 144\u2013149. IEEE (2012)","DOI":"10.1109\/PCi.2012.60"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Chen, L.-M., Chen, M.-C., Liao, W., Sun, Y.S.: A scalable network forensics mechanism for stealthy self-propagating attacks. Computer Communications (2013)","DOI":"10.1016\/j.comcom.2013.05.005"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-24741-8_8","volume-title":"Advances in Database Technology - EDBT 2004","author":"J. Lin","year":"2004","unstructured":"Lin, J., Vlachos, M., Keogh, E., Gunopulos, D.: Iterative incremental clustering of time series. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 106\u2013122. Springer, Heidelberg (2004)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Matsubara, Y., Sakurai, Y., Faloutsos, C., Iwata, T., Yoshikawa, M.: Fast mining and forecasting of complex time-stamped events. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 271\u2013279. ACM, New York (2012)","DOI":"10.1145\/2339530.2339577"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1145\/1142473.1142545","volume-title":"Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data","author":"S. Papadimitriou","year":"2006","unstructured":"Papadimitriou, S., Yu, P.: Optimal multi-scale patterns in time series streams. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 647\u2013658. ACM, New York (2006)"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/978-3-642-33460-3_39","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"E.E. Papalexakis","year":"2012","unstructured":"Papalexakis, E.E., Faloutsos, C., Sidiropoulos, N.D.: ParCube: Sparse parallelizable tensor decompositions. In: Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012, Part I. LNCS, vol.\u00a07523, pp. 521\u2013536. Springer, Heidelberg (2012)"},{"key":"1_CR13","first-page":"316","volume-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012","author":"U. Kang","year":"2012","unstructured":"Kang, U., Papalexakis, E., Harpale, A., Faloutsos, C.: Gigatensor: scaling tensor analysis up by 100 times - algorithms and discoveries. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 316\u2013324. ACM, New York (2012)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06608-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T15:26:33Z","timestamp":1558884393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06608-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066073","9783319066080"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06608-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}