{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:17:25Z","timestamp":1743221845221,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642306327"},{"type":"electronic","value":"9783642306334"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30633-4_16","type":"book-chapter","created":{"date-parts":[[2012,5,30]],"date-time":"2012-05-30T03:25:28Z","timestamp":1338348328000},"page":"122-125","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function"],"prefix":"10.1007","author":[{"given":"Cynthia","family":"Wagner","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/3-540-45412-8_16","volume-title":"Quality of Future Internet Services","author":"K. Cho","year":"2001","unstructured":"Cho, K., Kaizaki, R., Kato, A.: Aguri: An Aggregation-Based Traffic Profiler. In: Smirnov, M., Crowcroft, J., Roberts, J., Boavida, F. (eds.) QofIS 2001. LNCS, vol.\u00a02156, pp. 222\u2013242. Springer, Heidelberg (2001)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Culotta, A., Sorensen, J.: Dependency Tree Kernels for Relation Extraction. In: 42nd Ann. Meet. on Association for Computational Linguistics, Spain (2004)","DOI":"10.3115\/1218955.1219009"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Estan, C.: Building a better NetFlow. In: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 245\u2013256 (2004)","DOI":"10.1145\/1015467.1015495"},{"issue":"4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L. Kahn","year":"2007","unstructured":"Kahn, L., Awad, M., Thuraisungham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal\u00a016(4), 507\u2013521 (2007)","journal-title":"The VLDB Journal"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1007\/978-3-540-45235-5_83","volume-title":"Information Networking","author":"R. Kaizaki","year":"2003","unstructured":"Kaizaki, R., Nakamura, O., Murai, J.: Characteristics of Denial of Service Attacks on Internet Using Aguri. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol.\u00a02662, pp. 849\u2013857. Springer, Heidelberg (2003)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: Multilevel Traffic Classification in the Dark. In: ACM SIGCOMM 2005, Pennsylvania, USA (2005)","DOI":"10.1145\/1080091.1080119"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-00975-4_2","volume-title":"Passive and Active Network Measurement","author":"E. Karpilovsky","year":"2009","unstructured":"Karpilovsky, E., Gerber, A., Pei, D., Rexford, J., Shaikh, A.: Quantifying the Extent of IPv6 Deployment. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.\u00a05448, pp. 13\u201322. Springer, Heidelberg (2009)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. In: ACM SIGCOMM 2005, Philadelphia, Pennsylvania, USA (2005)","DOI":"10.1145\/1080091.1080118"},{"key":"16_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-540-24668-8_21","volume-title":"Passive and Active Network Measurement","author":"A. McGregor","year":"2004","unstructured":"McGregor, A., Hall, M., Lorier, P., Brunskill, J.: Flow Clustering Using Machine Learning Techniques. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol.\u00a03015, pp. 205\u2013214. Springer, Heidelberg (2004)"},{"issue":"4","key":"16_CR10","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1145\/321479.321481","volume":"15","author":"D.R. Morrison","year":"1968","unstructured":"Morrison, D.R.: PATRICIA- - Practical Algorithm To Retrieve Infromation Coded in Alphanumeric. ACM Journal\u00a015(4), 514\u2013534 (1968)","journal-title":"ACM Journal"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-01645-5_4","volume-title":"Traffic Monitoring and Analysis","author":"I. Paredes-Oliva","year":"2009","unstructured":"Paredes-Oliva, I., Barlet-Ros, P., Sol\u00e9-Pareta, J.: Portscan Detection with Sampled NetFlow. In: Papadopouli, M., Owezarski, P., Pras, A. (eds.) TMA 2009. LNCS, vol.\u00a05537, pp. 26\u201333. Springer, Heidelberg (2009)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Schoelkopf, B., Smola, J.: Learning with kernels, ch. 1-3. MIT Press (2002)","DOI":"10.7551\/mitpress\/4175.001.0001"},{"key":"16_CR13","unstructured":"Vapnik, V.: Statistical Learning Theory. Wiley (1998)"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-20757-0_3","volume-title":"NETWORKING 2011","author":"C. Wagner","year":"2011","unstructured":"Wagner, C., Fran\u00e7ois, J., State, R., Engel, T.: Machine Learning Approach for IP-Flow Record Anomaly Detection. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. LNCS, vol.\u00a06640, pp. 28\u201339. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Dependable Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30633-4_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T01:27:29Z","timestamp":1743211649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30633-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642306327","9783642306334"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30633-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}