{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:52:25Z","timestamp":1774367545788,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642213229","type":"print"},{"value":"9783642213236","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21323-6_6","type":"book-chapter","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T11:24:58Z","timestamp":1306754698000},"page":"41-49","source":"Crossref","is-referenced-by-count":2,"title":["Digging into IP Flow Records with a Visual Kernel Method"],"prefix":"10.1007","author":[{"given":"Cynthia","family":"Wagner","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Wagener","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"6_CR1","doi-asserted-by":"publisher","first-page":"3154","DOI":"10.1016\/j.cor.2005.11.023","volume":"34","author":"C. Cifarelli","year":"2007","unstructured":"Cifarelli, C., Nieddu, L., Seref, O., Pardalos, P.M.: K.-T.R.A.C.E.: A kernel k-means procedure for classification. Computers and Operations Research\u00a034(10), 3154\u20133161 (2007)","journal-title":"Computers and Operations Research"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-45412-8_16","volume-title":"Quality of Future Internet Services","author":"K. Cho","year":"2001","unstructured":"Cho, K., Kaizaki, R., Kato, A.: Aguri: An aggregation-based traffic profiler. In: Smirnov, M., Crowcroft, J., Roberts, J., Boavida, F. (eds.) QofIS 2001. LNCS, vol.\u00a02156, pp. 222\u2013242. Springer, Heidelberg (2001)"},{"issue":"2","key":"6_CR3","first-page":"101","volume":"26","author":"M.F. Cowlishaw","year":"1985","unstructured":"Cowlishaw, M.F.: Fundamental Requirements for Picture Presentation. Proceedings of the Society for Picture Presentation\u00a026(2), 101\u2013107 (1985)","journal-title":"Proceedings of the Society for Picture Presentation"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Glanfield, J., Brooks, S., Taylor, T., Paterson, D., Smith, C., Gates, C., McHugh, J.: OverFlow: An Overview Visualization for Network Analysis. In: 6th International Workshop on Visualization for Cyber Security, Atlantic City, NJ (2009)","DOI":"10.1109\/VIZSEC.2009.5375536"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/CATCH.2009.47","volume-title":"Conference for Homeland Security, Cybersecurity Applications & Technology","author":"J.R. Goodall","year":"2009","unstructured":"Goodall, J.R., Tesone, D.R.: Visual Analytics for Network Flow Analysis. In: Conference for Homeland Security, Cybersecurity Applications & Technology, pp. 199\u2013204. IEEE, Los Alamitos (2009)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Mansmann, F., Fischer, F., Keim, D.A., North, S.C.: Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations. In: Proceeding of ACM CHiMitiT 2009, Balitmore, Maryland, pp. 19\u201328 (2009)","DOI":"10.1145\/1641587.1641590"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-01645-5_4","volume-title":"Traffic Monitoring and Analysis","author":"I. Paredes-Oliva","year":"2009","unstructured":"Paredes-Oliva, I.: Portscan Detection with Sampled NetFlow. In: Papadopouli, M., Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol.\u00a05537, pp. 26\u201333. Springer, Heidelberg (2009)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Patole, V.A., Pachghare, V.K., Kulkarni, P.: Self Organizing Maps to build Intrusion Detection Systems. Journal of Computer Applications\u00a01(8) (2010)","DOI":"10.5120\/191-328"},{"key":"6_CR9","unstructured":"Rieck, K.: Machine Learning for Application-layer Intrusion Detection. In: Fraunhofer Institute FIRST and Berlin Institute of Technology, Berlin, Germany (2009)"},{"key":"6_CR10","volume-title":"Honeypots: Tracking Hackers","author":"L. Spitzner","year":"2002","unstructured":"Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Professional, Reading (2002)"},{"key":"6_CR11","volume-title":"Statistical Learning Theory","author":"V. Vapnik","year":"1998","unstructured":"Vapnik, V.: Statistical Learning Theory. Wiley, Chichester (1998)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Wagner, C., Wagener, G., State, R., Dulaunoy, A., Engel, T.: Game Theory Driven Monitoring of Spatial-Aggregated IP-Flow Records. In: 6th International Conference on Network and Services Management, Niagara Falls, Canada (2010)","DOI":"10.1109\/CNSM.2010.5691265"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21323-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T05:08:57Z","timestamp":1560229737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21323-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642213229","9783642213236"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21323-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}