{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:51:51Z","timestamp":1725796311694},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319091280"},{"type":"electronic","value":"9783319091297"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09129-7_26","type":"book-chapter","created":{"date-parts":[[2014,7,3]],"date-time":"2014-07-03T08:21:21Z","timestamp":1404375681000},"page":"342-351","source":"Crossref","is-referenced-by-count":0,"title":["3D Network Traffic Monitoring Based on an Automatic Attack Classifier"],"prefix":"10.1007","author":[{"given":"Diego Roberto Colombo","family":"Dias","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Remo Ferreira","family":"Brega","sequence":"additional","affiliation":[]},{"given":"Luis Carlos","family":"Trevelin","sequence":"additional","affiliation":[]},{"given":"Bruno Barberi","family":"Gnecco","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Paulo","family":"Papa","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"de Paiva Guimar\u00e3es","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"TCPDUMP. TCPDUMM & LIBPCAP, http:\/\/www.tcpdump.org\/ (accessed September 2012)"},{"key":"26_CR2","unstructured":"NGREP, Ngrep \u2013 networl grep, http:\/\/ngrep.sourceforge.net\/ (accessed September 2012)"},{"key":"26_CR3","unstructured":"SNORT. Snort:Home Page, http:\/\/www.snort.org\/ (accessed September 2012)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Papa, J.P., Falc\u00e3o, A.X., Suzuki, C.T.N.: Supervised Pattern Classification based on Optimum-Path Forest. Journal of Imaging Systems and Technology\u00a019(2), 120\u2013131 (2009) ISSN: 0899-9457","DOI":"10.1002\/ima.20188"},{"key":"26_CR5","unstructured":"ETHERAPE. EtherApe, a graphical network monitor, http:\/\/etherape.sourceforge.net\/ (accessed September 2012)"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Ball, R., Fink, G.A., North, C.: Home-Centric Visualization of Network Traffic for Security Administration. In: VizSEC\/DMSEC 2004: Proceedings of the 2004 ACM Workshop on Visualization and, pp. 55\u201364. ACM Press (2004)","DOI":"10.1145\/1029208.1029217"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Lau, S.: The Spinning Cube of Potential Doom. Communications of the ACM\u00a047(6) (June 2004)","DOI":"10.1145\/990680.990699"},{"key":"26_CR8","unstructured":"Lakkaraju, K., Yurcik, W., Lee, A.J.: NVisionIP: netflow visualizations of system state for security situational awareness. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining For Computer Security, VizSEC\/DMSEC 2004, Washington DC, USA, pp. 65\u201372. ACM, New York (2004), doi: http:\/\/doi.acm.org\/10.1145\/1029208.1029219"},{"key":"26_CR9","unstructured":"SNORT. Snort network intrusion prevention and detection system, http:\/\/www.snort.org (accessed September 2012)"},{"key":"26_CR10","unstructured":"TRAFSHOW. Network traffic monitoring utility, http:\/\/linux.maruhn.com\/sec\/trafshow.html (accessed September 2012)"},{"key":"26_CR11","unstructured":"SYMANTEC. Symantec \u2013 Confidence in a connected world, http:\/\/www.symantec.com\/threatreport\/topic.jsp?id=highlights (accessed September 2012)"},{"key":"26_CR12","unstructured":"Khan, M., Khan, S.S.: Data and Information Visualization Methods, and Interactive Mechanisms: A Survey. International Journal of Computer Applications\u00a034(1), 0975\u20138887 (2011)"},{"key":"26_CR13","unstructured":"WIIUSEJ. Java Api for Wiimotes: WiiUseJ, http:\/\/code.google.com\/p\/wiiusej\/ (accessed September 2012)"},{"key":"26_CR14","unstructured":"OPENNI. OpenNI \u2013 Introducing OpenNI, http:\/\/openni.org\/ (accessed September 2012)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09129-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T10:47:37Z","timestamp":1565606857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09129-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091280","9783319091297"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09129-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}