{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:28:53Z","timestamp":1725877733502},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811036132"},{"type":"electronic","value":"9789811036149"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-3614-9_66","type":"book-chapter","created":{"date-parts":[[2017,1,7]],"date-time":"2017-01-07T00:02:41Z","timestamp":1483747361000},"page":"530-535","source":"Crossref","is-referenced-by-count":0,"title":["Research on Distributed Anomaly Traffic Detection Technology Based on Hadoop Platform"],"prefix":"10.1007","author":[{"given":"Qiang","family":"Chen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,8]]},"reference":[{"key":"66_CR1","unstructured":"Hubbard, D., Sutton, M.: Top threats to cloud computing V1.0. Cloud Security Alliance (2010)"},{"key":"66_CR2","doi-asserted-by":"crossref","unstructured":"Dede, E., Govindaraju, M., Gunter, D., Canon, R.S., Ramakrishnan, L.: Performance evaluation of a MongoDB and hadoop platform for scientific data analysis. In: Science Cloud 2013 Proceedings of the 4th ACM Workshop on Scientific Cloud Computing, pp. 13\u201320 (2013)","DOI":"10.1145\/2465848.2465849"},{"key":"66_CR3","unstructured":"Scheidell, M.: Intrusion Detection System. Google Patents (2009)"},{"key":"66_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-24852-1_33","volume-title":"Applied Cryptography and Network Security","author":"D Yu","year":"2004","unstructured":"Yu, D., Frincke, D.: A novel framework for alert correlation and understanding. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 452\u2013466. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24852-1_33"},{"key":"66_CR5","doi-asserted-by":"crossref","unstructured":"Hao, C., Ying, Q.: Research of cloud computing based on the hadoop platform. In: 2011 International Conference on Computational and Information Sciences (ICCIS) (2013)","DOI":"10.1109\/ICCIS.2011.213"},{"issue":"2","key":"66_CR6","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing. Commun. ACM 53(2), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"66_CR7","unstructured":"Wang, Y., Wang, S.: Research and implementation on spatial data storage and operation based on Hadoop platform. In: International Conference on Geoscience and Remote Sensing (IITA-GRS), Second IITA (2010)"},{"issue":"1","key":"66_CR8","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Sys. 28(1), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Sys."},{"key":"66_CR9","unstructured":"Agarwal, D., Gonzdlez, J.M., Jin, G., et al.: An Infrastructure for Passive Network Monitoring of Application Data Streams (2003)"},{"key":"66_CR10","volume-title":"Mahout in Action","author":"S Owen","year":"2011","unstructured":"Owen, S., Anil, R., Dunning, T., et al.: Mahout in Action. Manning, Shelter Island (2011)"}],"container-title":["Communications in Computer and Information Science","Bio-inspired Computing \u2013 Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3614-9_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T03:30:11Z","timestamp":1568691011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3614-9_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811036132","9789811036149"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3614-9_66","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}