{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:20:18Z","timestamp":1766136018933},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642009747"},{"type":"electronic","value":"9783642009754"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00975-4_19","type":"book-chapter","created":{"date-parts":[[2009,3,30]],"date-time":"2009-03-30T08:19:52Z","timestamp":1238401192000},"page":"187-196","source":"Crossref","is-referenced-by-count":19,"title":["Uncovering Artifacts of Flow Measurement Tools"],"prefix":"10.1007","author":[{"given":"\u00cdtalo","family":"Cunha","sequence":"first","affiliation":[]},{"given":"Fernando","family":"Silveira","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Renata","family":"Teixeira","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Diot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"19_CR1","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1140103.1140294","volume":"34","author":"Q. Zhao","year":"2006","unstructured":"Zhao, Q., Ge, Z., Wang, J., Xu, J.: Robust Traffic Matrix Estimation with Imperfect Information: Making use of Multiple Data Sources. SIGMETRICS Perform. Eval. Rev.\u00a034(1), 133\u2013144 (2006)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A Signal Analysis of Network Traffic Anomalies. In: Proc. ACM IMW, Marseille, France (November 2002)","DOI":"10.1145\/637201.637210"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: Proc. ACM SIGCOMM, Philadelphia, PA (August 2005)","DOI":"10.1145\/1080091.1080118"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Sommer, R., Feldmann, A.: NetFlow: Information Loss or Win?. In: Proc. ACM IMW, Marseille, France (November 2002)","DOI":"10.1145\/637201.637226"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Estan, C., Keys, K., Moore, D., Varghese, G.: Building a Better NetFlow. In: Proc. of ACM SIGCOMM, Portland, OR (August 2004)","DOI":"10.1145\/1015467.1015495"},{"issue":"2","key":"19_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1064413.1064417","volume":"35","author":"J. Wallerich","year":"2005","unstructured":"Wallerich, J., Dreger, H., Feldmann, A., Krishnamurthy, B., Willinger, W.: A Methodology for Studying Persistency Aspects of Internet Flows. SIGCOMM Comput. Commun. Rev.\u00a035(2), 23\u201336 (2005)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"19_CR7","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/1111572.1111579","volume":"33","author":"B.Y. Choi","year":"2005","unstructured":"Choi, B.Y., Bhattacharyya, S.: Observations on Cisco Sampled NetFlow. SIGMETRICS Perform. Eval. Rev.\u00a033(3), 18\u201323 (2005)","journal-title":"SIGMETRICS Perform. Eval. Rev."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Kompella, R., Estan, C.: The Power of Slicing in Internet Flow Measurement. In: Proc. ACM IMC, Berkeley, CA (October 2005)","DOI":"10.1145\/1330107.1330119"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Network Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00975-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T03:05:27Z","timestamp":1551927927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00975-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642009747","9783642009754"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00975-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}