{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:13Z","timestamp":1749701653233,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_83","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"863-867","source":"Crossref","is-referenced-by-count":1,"title":["NetFlow: Network Monitoring and Intelligence Gathering"],"prefix":"10.1007","author":[{"given":"Vivek","family":"Ratan","sequence":"first","affiliation":[]},{"given":"Kin Fun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"83_CR1","unstructured":"CISCO: Introduction to Cisco IOS NetFlow, White Paper (2012) 1-16"},{"key":"83_CR2","unstructured":"Peddu, B.: ASR9K NetFlow White Paper. Cisco Support Community, https:\/\/supportforums.cisco.com\/document\/11933991\/asr9k-netflow-white-paper [accessed: September 1, 2016]"},{"key":"83_CR3","unstructured":"Pandora FMS: Documentation NetFlow. http:\/\/wiki.pandorafms.com\/index.php?title=Pandora:Documentation_en:Netflow [accessed: September 1, 2016]"},{"key":"83_CR4","doi-asserted-by":"crossref","unstructured":"Marchal, S., Jiang, X., State, R., Engel, T.: A Big Data Architecture for Large Scale Security Monitoring. IEEE International Congress on Big Data (2014) 56-63","DOI":"10.1109\/BigData.Congress.2014.18"},{"key":"83_CR5","doi-asserted-by":"crossref","unstructured":"Bodenham, D.A., Adams, N.M.: Continuous Monitoring of a Computer Network Using Multivariate Adaptive Estimation. IEEE 13th International Conference on Data Mining Workshops (2013) 311-318","DOI":"10.1109\/ICDMW.2013.114"},{"key":"83_CR6","doi-asserted-by":"crossref","unstructured":"Hsiao, H.-W., Chen, D.-N., Wu, T.J.: Detecting Hiding Malicious Website Using Network Traffic Mining Approach. 2nd International conference on Education Technology and Computer (2010) v5-276-280","DOI":"10.1109\/ICETC.2010.5530064"},{"key":"83_CR7","doi-asserted-by":"crossref","unstructured":"Najafabadi, M.M., Khoshgoftaar, T.M., Calvert, C., Kemp C.: Detection of SSH Brute Force Attacks Using Aggregated Netflow Data. IEEE 14th International Conference on Machine Learning and Applications (2015) 283-288","DOI":"10.1109\/ICMLA.2015.20"},{"key":"83_CR8","unstructured":"Taylor, T., Paterson, D., Glanfield, J., Gates, C.: FloVis: Flow Visualization System. Cybersecurity Applications & Technology Conference for Homeland Security (2009) 186-198"},{"key":"83_CR9","unstructured":"Zhou, X., Petrovic, M., Eskridge, T., Carvalho, M., Tao, X.: Exploring Netflow Data Using Hadoop. ASE Big Data \/ Social Com \/ Cybersecurity Conference (2014) 1-10"},{"key":"83_CR10","unstructured":"Torres, L.M., Magafia, E., Izal, M., Morato, D.: Identifying Sessions to Websites as an Aggregation of Related Flows. XVth International Telecommunications Network Strategy and Planning Symposium (2012) 1-6"},{"key":"83_CR11","doi-asserted-by":"crossref","unstructured":"Caracas, A., Kind, A., Gantenbein, D., Fussenegger, S., Dechouniotis, D.: Mining Semantic Relations using NetFlow. 3rd IEEE\/IFIP International Workshop on Businessdriven IT Management (2008) 110-111","DOI":"10.1109\/BDIM.2008.4540082"},{"key":"83_CR12","unstructured":"CISCO: NetFlow gives Network Managers a Detailed View of Application Flows on the Network, Case Study (2003) 1-13"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:01:02Z","timestamp":1749668462000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_83","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}