{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:10:39Z","timestamp":1743009039141,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238678"},{"type":"electronic","value":"9783319238685"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23868-5_27","type":"book-chapter","created":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T10:50:50Z","timestamp":1440845450000},"page":"383-396","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["MoVA: A Visual Analytics Tool Providing Insight in the Big Mobile Network Data"],"prefix":"10.1007","author":[{"given":"Ilias","family":"Kalamaras","sequence":"first","affiliation":[]},{"given":"Stavros","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"27_CR1","unstructured":"NEMESYS project (2015). http:\/\/www.nemesys-project.eu\/nemesys\/"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Petersen, J.K.: The telecommunications illustrated dictionary. CRC Press (2002)","DOI":"10.1201\/9781420040678"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Lee, P.P.C., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G wireless networks. In: 26th IEEE International Conference on Computer Communications, pp. 1289\u20131297. IEEE (2007)","DOI":"10.1109\/INFCOM.2007.153"},{"issue":"15","key":"27_CR4","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1016\/j.comnet.2009.05.008","volume":"53","author":"P.P.C. Lee","year":"2009","unstructured":"Lee, P.P.C., Bu, T., Woo, T.: On the detection of signaling DoS attacks on 3G\/WiMax wireless networks. Computer Networks\u00a053(15), 2601\u20132616 (2009)","journal-title":"Computer Networks"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"D\u2019Alconzo, A., Coluccia, A., Ricciato, F., Romirer-Maierhofer, P.: A distribution-based approach to anomaly detection and application to 3G mobile traffic. In: IEEE Global Telecommunications Conference, GLOBECOM 2009, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/GLOCOM.2009.5425651"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-642-36784-7_9","volume-title":"Data Traffic Monitoring and Analysis","author":"A. Coluccia","year":"2013","unstructured":"Coluccia, A., D\u2019Alconzo, A., Ricciato, F.: Distribution-based anomaly detection in network traffic. In: Biersack, E., Callegari, C., Matijasevic, M. (eds.) Data Traffic Monitoring and Analysis. LNCS, vol.\u00a07754, pp. 202\u2013216. Springer, Heidelberg (2013)"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-642-04342-0_11","volume-title":"Recent Advances in Intrusion Detection","author":"G. Yan","year":"2009","unstructured":"Yan, G., Eidenbenz, S., Galli, E.: Sms-watchdog: Profiling social behaviors of sms users for anomaly detection. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol.\u00a05758, pp. 202\u2013223. Springer, Heidelberg (2009)"},{"key":"27_CR8","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-36883-7_6","volume-title":"Security and Privacy in Communication Networks","author":"E.K. Kim","year":"2013","unstructured":"Kim, E.K., McDaniel, P., La Porta, T.: A detection mechanism for SMS flooding attacks in cellular networks. In: Keromytis, A.D., Di Pietro, R. (eds.) SecureComm 2012. LNICST, vol.\u00a0106, pp. 76\u201393. Springer, Heidelberg (2013)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Murynets, I., Jover, R.P.: Anomaly detection in cellular Machine-to-Machine communications. In: 2013 IEEE International Conference on Communications (ICC), pp. 2138\u20132143. IEEE (2013)","DOI":"10.1109\/ICC.2013.6654843"},{"issue":"4","key":"27_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N. Eagle","year":"2006","unstructured":"Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal and Ubiquitous Computing\u00a010(4), 255\u2013268 (2006)","journal-title":"Personal and Ubiquitous Computing"},{"key":"27_CR11","unstructured":"Ye, Q., Zhu, T., Hu, D., Wu, B., Du, N., Wang, B.: Cell phone mini challenge award: Social network accuracy exploring temporal communication in mobile call graphs. In: IEEE Symposium on Visual Analytics Science and Technology, VAST 2008, IEEE (2008)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Shen, Z., Ma, K.-L.: Mobivis: A visualization system for exploring mobile data. In: IEEE Pacific Visualization Symposium, PacificVIS 2008, pp. 175\u2013182. IEEE (2008)","DOI":"10.1109\/PACIFICVIS.2008.4475474"},{"key":"27_CR13","unstructured":"SAS Visual Analytics (2015). http:\/\/www.sas.com"},{"key":"27_CR14","unstructured":"Tableau Analytics (2015). http:\/\/www.tableau.com\/"},{"key":"27_CR15","unstructured":"Certifuge Systems (2015). http:\/\/centrifugesystems.com\/"},{"key":"27_CR16","unstructured":"Alcatel Security-guardian (2015). http:\/\/www.alcatel-lucent.com\/solutions\/security-guardian"},{"key":"27_CR17","unstructured":"NSN mobile guard (2015). http:\/\/nsn.com\/sites\/default\/files\/document\/nsn_mobile_guard_executive_summary.pdf"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: ACM Sigmod Record, vol.\u00a029, pp. 93\u2013104. ACM (2000)","DOI":"10.1145\/335191.335388"},{"key":"27_CR19","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-319-09465-6_21","volume-title":"Information Sciences and Systems 2014","author":"S. Papadopoulos","year":"2014","unstructured":"Papadopoulos, S., Mavroudis, V., Drosou, A., Tzovaras, D.: Visual Analytics for Enhancing Supervised Attack Attribution in Mobile Networks. In: Information Sciences and Systems 2014, pp. 193\u2013203. Springer, Heidelberg (2014)"},{"issue":"5","key":"27_CR20","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1109\/TMM.2014.2316473","volume":"16","author":"I. Kalamaras","year":"2014","unstructured":"Kalamaras, I., Drosou, A., Tzovaras, D.: Multi-Objective Optimization for Multimodal Visualization. IEEE Transactions on Multimedia\u00a016(5), 1460\u20131472 (2014)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"1","key":"27_CR21","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine Learning\u00a045(1), 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Ding, B., Lo, D., Han, J., Khoo, S.-C.: Efficient mining of closed repetitive gapped subsequences from a sequence database. In: IEEE 25th International Conference on Data Engineering, ICDE 2009, pp. 1024\u20131035. IEEE (2009)","DOI":"10.1109\/ICDE.2009.104"},{"key":"27_CR23","unstructured":"GenieLog, GEDIS Studio online (2014)"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23868-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,13]],"date-time":"2023-08-13T14:49:35Z","timestamp":1691938175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23868-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238678","9783319238685"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23868-5_27","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"15 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}