{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:52:12Z","timestamp":1742982732610,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319399362"},{"type":"electronic","value":"9783319399379"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39937-9_29","type":"book-chapter","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T05:00:15Z","timestamp":1464325215000},"page":"378-389","source":"Crossref","is-referenced-by-count":0,"title":["Internet Traffic Analysis in a Large University Town: A Graphical and Clustering Approach"],"prefix":"10.1007","author":[{"given":"Weitao","family":"Weng","sequence":"first","affiliation":[]},{"given":"Kai","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Kuai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaoyou","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,28]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Borgnat, P., Dewaele, G., Fukuda, K., Abry, P., Cho, K.: Seven years and one day: sketching the evolution of internet traffic. In: Proceedings of IEEE INFOCOM, pp. 711\u2013719 (2009)","DOI":"10.1109\/INFCOM.2009.5061979"},{"issue":"4","key":"29_CR2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/1851275.1851194","volume":"41","author":"C Labovitz","year":"2011","unstructured":"Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J., Jahanian, F.: Internet inter-domain traffic. ACM SIGCOMM Comput. Commun. Rev. 41(4), 75\u201386 (2011)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Kihl, M., Odling, P., Lagerstedt, C., Aurelius, A.: Traffic analysis and characterization of internet user behavior. In: Proceedings of ICUMT, pp. 224\u2013231 (2010)","DOI":"10.1109\/ICUMT.2010.5676633"},{"issue":"4","key":"29_CR4","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/1090191.1080112","volume":"35","author":"K Xu","year":"2005","unstructured":"Xu, K., Zhang, Z.L., Bhattacharyya, S.: Profiling internet backbone traffic: behavior models and applications. ACM SIGCOMM Comput. Commun. Rev. 35(4), 169\u2013180 (2005)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"6825","key":"29_CR5","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1038\/35065725","volume":"410","author":"SH Strogatz","year":"2001","unstructured":"Strogatz, S.H.: Exploring complex networks. Nature 410(6825), 268\u2013276 (2001)","journal-title":"Nature"},{"key":"29_CR6","first-page":"417","volume-title":"The Sage Handbook of Social Network Analysis","author":"SP Borgatti","year":"2011","unstructured":"Borgatti, S.P., Halgin, D.S.: Analyzing affiliation networks. In: Carrington, P., Scott, J. (eds.) The Sage Handbook of Social Network Analysis, pp. 417\u2013433. Sage Publications, Thousand Oaks (2011)"},{"key":"29_CR7","first-page":"849","volume":"2","author":"AY Ng","year":"2002","unstructured":"Ng, A.Y., Jordan, M.I., Weiss, Y., et al.: On spectral clustering: analysis and an algorithm. Adv. Neural Inf. Process. Syst. 2, 849\u2013856 (2002)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"3","key":"29_CR8","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/TNET.2013.2264634","volume":"22","author":"K Xu","year":"2014","unstructured":"Xu, K., Wang, F., Gu, L.: Behavior analysis of internet traffic via bipartite graphs and one-mode projections. IEEE\/ACM Trans. Netw. 22(3), 931\u2013942 (2014)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"2","key":"29_CR9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., et al.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"4","key":"29_CR10","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1016\/j.comnet.2008.09.022","volume":"53","author":"M Zink","year":"2009","unstructured":"Zink, M., Suh, K., Gu, Y., Kurose, J.: Characteristics of youtube network traffic at a campus network-measurements, models, and implications. Comput. Netw. 53(4), 501\u2013514 (2009)","journal-title":"Comput. Netw."},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Passive and Active Measurement","author":"C Lee","year":"2012","unstructured":"Lee, C., Lee, D.K., Moon, S.: Unmasking the growing UDP traffic in a campus network. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol. 7192, pp. 1\u201310. Springer, Heidelberg (2012)"},{"issue":"14","key":"29_CR12","doi-asserted-by":"crossref","first-page":"2690","DOI":"10.1016\/j.comnet.2008.05.003","volume":"52","author":"T Henderson","year":"2008","unstructured":"Henderson, T., Kotz, D., Abyzov, I.: The changing usage of a mature campus-wide wireless network. Comput. Netw. 52(14), 2690\u20132712 (2008)","journal-title":"Comput. Netw."},{"issue":"27","key":"29_CR13","first-page":"A35","volume":"48","author":"F Olsen","year":"2002","unstructured":"Olsen, F.: The growing vulnerability of campus networks. Chron. High. Educ. 48(27), A35 (2002)","journal-title":"Chron. High. Educ."},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of ACM SIGCOMM Workshop on Internet Measurment, pp. 71\u201382 (2002)","DOI":"10.1145\/637201.637210"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Gu, Y., McCallum, A., Towsley, D.: Detecting anomalies in network traffic using maximum entropy estimation. In: Proceedings of ACM SIGCOMM Conference on Internet Measurement, pp. 32\u201332 (2005)","DOI":"10.1145\/1330107.1330148"},{"issue":"2","key":"29_CR16","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1129582.1129589","volume":"36","author":"L Bernaille","year":"2006","unstructured":"Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. ACM SIGCOMM Comput. Commun. Rev. 36(2), 23\u201326 (2006)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"99","key":"29_CR17","first-page":"1","volume":"PP","author":"T Qin","year":"2014","unstructured":"Qin, T., Guan, X., Wang, C., Liu, Z.: MUCM: multilevel user cluster mining based on behavior profiles for network monitoring. IEEE Syst. J. PP(99), 1\u201312 (2014)","journal-title":"IEEE Syst. J."}],"container-title":["Lecture Notes in Computer Science","Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39937-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T19:38:51Z","timestamp":1567971531000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39937-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319399362","9783319399379"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39937-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}