{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:39Z","timestamp":1725567399287},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642166259"},{"type":"electronic","value":"9783642166266"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16626-6_13","type":"book-chapter","created":{"date-parts":[[2010,10,7]],"date-time":"2010-10-07T13:06:51Z","timestamp":1286456811000},"page":"117-124","source":"Crossref","is-referenced-by-count":0,"title":["Monitoring of Spatial-Aggregated IP-Flow Records"],"prefix":"10.1007","author":[{"given":"Cynthia","family":"Wagner","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Wagener","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"C.J.C. Burges","year":"1998","unstructured":"Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery\u00a02(2), 121\u2013167 (1998)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-45412-8_16","volume-title":"Quality of Future Internet Services","author":"K. Cho","year":"2001","unstructured":"Cho, K., Kaizaki, R., Kato, A.: Aguri: An aggregation-based traffic profiler. In: Smirnov, M., Crowcroft, J., Roberts, J., Boavida, F. (eds.) QofIS 2001. LNCS, vol.\u00a02156, pp. 222\u2013242. Springer, Heidelberg (2001)"},{"issue":"10","key":"13_CR3","doi-asserted-by":"publisher","first-page":"3154","DOI":"10.1016\/j.cor.2005.11.023","volume":"34","author":"C. Cifarelli","year":"2007","unstructured":"Cifarelli, C., Nieddu, L., Seref, O., Pardalos, P.M.: K.-T.R.A.C.E.: A kernel k-means procedure for classification. Computers and Operations research\u00a034(10), 3154\u20133161 (2007)","journal-title":"Computers and Operations research"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Culotta, A., Sorensen, J.: Dependency Tree Kernels for Relation Extraction. In: 42nd Annual Meeting on Association for Computational Linguistics, Barcelona, Spain (2004)","DOI":"10.3115\/1218955.1219009"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Estan, C.: Building a better NetFlow. In: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 245\u2013256 (2004)","DOI":"10.1145\/1015467.1015495"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Foukarakis, M.: Flexible and High-Performance Anonymization of NetFlow Records using Anontoo. In: SECURECOMM Conference (2007)","DOI":"10.1109\/SECCOM.2007.4550304"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Gaertner, T.: A survey of kernels for structured Data. SIGKDD Explorations (2003)","DOI":"10.1145\/959242.959248"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Jinsong, W.: P2P Traffic Identification Based on NetFlow TCP Flag. In: Proceedings of the 2009 International Conference on Future Computer and Communication, pp. 700\u2013703 (2009)","DOI":"10.1109\/ICFCC.2009.151"},{"issue":"4","key":"13_CR9","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L. Kahn","year":"2007","unstructured":"Kahn, L., Awad, M., Thuraisungham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal\u00a016(4), 507\u2013521 (2007)","journal-title":"The VLDB Journal"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/978-3-540-45235-5_83","volume-title":"Information Networking","author":"R. Kaizaki","year":"2003","unstructured":"Kaizaki, R., Nakamura, O., Murai, J.: Characteristics of Denial of Service Attacks on Internet using Aguri. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol.\u00a02662, pp. 849\u2013857. Springer, Heidelberg (2003)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: Multilevel Traffic Classification in the Dark. In: ACM SIGCOMM 2005, Philadelphia, Pennsylvania, USA (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-00975-4_2","volume-title":"Passive and Active Network Measurement","author":"E. Karpilovsky","year":"2009","unstructured":"Karpilovsky, E.: Quantifying the Extent of IPv6 Deployment. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 13\u201322. Springer, Heidelberg (2009)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Krmicek, V.: NetFlow Based System for NAT Detection. In: Proceedings of the 5th International Student Workshop on Emerging Networking Experiments and Technologies (2009)","DOI":"10.1145\/1658997.1659010"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: ACM SIGCOMM 2005, Philadelphia, Pennsylvania, USA (2005)","DOI":"10.1145\/1080091.1080118"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow Clustering using Machine Learning. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-01645-5_4","volume-title":"Traffic Monitoring and Analysis","author":"I. Paredes-Oliva","year":"2009","unstructured":"Paredes-Oliva, I.: Portscan Detection with Sampled NetFlow. In: Papadopouli, M., Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol.\u00a05537, pp. 26\u201333. Springer, Heidelberg (2009)"},{"key":"13_CR17","first-page":"1","volume-title":"Learning with kernels, ch. 1-3","author":"B. Schoelkopf","year":"2002","unstructured":"Schoelkopf, B., Smola, J.: Learning with kernels, ch. 1-3, pp. 1\u201378. MIT Press, Cambridge (2002)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Sommer, R.: NetFlow: Information loss or win? In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement, pp. 173\u2013174 (2002)","DOI":"10.1145\/637201.637226"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16626-6_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:48:36Z","timestamp":1606186116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16626-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642166259","9783642166266"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16626-6_13","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2010]]}}}