{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:53:39Z","timestamp":1725558819066},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642139857"},{"type":"electronic","value":"9783642139864"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13986-4_20","type":"book-chapter","created":{"date-parts":[[2010,6,26]],"date-time":"2010-06-26T09:57:58Z","timestamp":1277546278000},"page":"135-146","source":"Crossref","is-referenced-by-count":5,"title":["Mining NetFlow Records for Critical Network Activities"],"prefix":"10.1007","author":[{"given":"Shaonan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ourdane","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Aguilera, M.K., Mogul, J.C., Wiener, J.L., Reynolds, P., Muthitacharoen, A.: Performance debugging for distributed systems of black boxes. In: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 74\u201389 (2003)","DOI":"10.1145\/945445.945454"},{"key":"20_CR2","unstructured":"Barham, P., Black, R., Goldszmidt, M., Isaacs, R., MacCormick, J., Mortier, R., Simma, A.: Constellation: automated discovery of service and host dependencies in networked systems. TechReport, MSR-TR-2008-67 (2008)"},{"issue":"1-7","key":"20_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S. Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems\u00a030(1-7), 107\u2013117 (1998)","journal-title":"Computer networks and ISDN systems"},{"key":"20_CR4","unstructured":"Chen, M., Accardi, A., Kiciman, E., Lloyd, J.: Path-based failure and evolution management. In: NSDI 2004 (January 2004)"},{"key":"20_CR5","unstructured":"Chen, X., Zhang, M., Mao, Z.M., Bahl, P.: Automating network application dependency discovery: Experiences, limitations, and new solutions. In: Proceedings of OSDI (2008)"},{"key":"20_CR6","unstructured":"Internet Engineering\u00a0Task Force(IETF). Ip flow information export (ipfix) (March 2010), \n                    \n                      http:\/\/www.ietf.org\/dyn\/wg\/charter\/ipfix-charter.html"},{"key":"20_CR7","unstructured":"Network\u00a0Working Group. Rpc: Remote procedure call protocol specification version 2 (March 2010), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc5531"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M., Singh, S., Varghese, G.: Network monitoring using traffic dispersion graphs (tdgs). In: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pp. 315\u2013320 (2007)","DOI":"10.1145\/1298306.1298349"},{"key":"20_CR9","unstructured":"Jian-Guang, L., Qiang, F., Yi Wang, J.: Mining dependency in distributed systems through unstructured logs analysis, \n                    \n                      http:\/\/research.microsoft.com"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Kandula, S., Chandra, R., Katabi, D.: What\u2019s going on?: learning communication rules in edge networks. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 87\u201398 (2008)","DOI":"10.1145\/1402958.1402970"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Kannan, J., Jung, J., Paxson, V., Koksal, C.E.: Semi-automated discovery of application session structure. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pp. 119\u2013132 (2006)","DOI":"10.1145\/1177080.1177096"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM)\u00a046(5) (September 1999)","DOI":"10.1145\/324133.324140"},{"key":"20_CR13","unstructured":"Ng, A.Y., Zheng, A.X., Jordan, M.I.: Link analysis, eigenvectors and stability. In: International Joint Conference on Artificial Intelligence, vol.\u00a017(1), pp. 903\u2013910 (2001)"},{"key":"20_CR14","unstructured":"The\u00a0Honeynet Project. Scan18 (March 2010), \n                    \n                      http:\/\/old.honeynet.org\/scans\/scan18\/"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Reynolds, P., Wiener, J.L., Mogul, J.C., Aguilera, M.K., Vahdat, A.: Wap5: black-box performance debugging for wide-area systems. In: Proceedings of the 15th international conference on World Wide Web, pp. 347\u2013356 (2006)","DOI":"10.1145\/1135777.1135830"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-88313-5_2","volume-title":"Computer Security - ESORICS 2008","author":"R. Sawilla","year":"2008","unstructured":"Sawilla, R., Ou, X.: Identifying critical attack assets in dependency attack gaphs. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 18\u201334. Springer, Heidelberg (2008)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Wang, S., State, R., Ourdane, M., Engel, T.: Mining netflow records for critical network activities. In: Proceedings of the 6th International Wireless Communications & Mobile Computing Conference (2010)","DOI":"10.1007\/978-3-642-13986-4_20"}],"container-title":["Lecture Notes in Computer Science","Mechanisms for Autonomous Management of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13986-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T23:47:42Z","timestamp":1552607262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13986-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642139857","9783642139864"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13986-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}