{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T12:10:27Z","timestamp":1690719027731},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,27]],"date-time":"2014-11-27T00:00:00Z","timestamp":1417046400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s13278-014-0240-2","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T18:06:30Z","timestamp":1417543590000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SharkFin: Spatio-temporal mining of software adoption and penetration"],"prefix":"10.1007","volume":"4","author":[{"given":"Evangelos E.","family":"Papalexakis","sequence":"first","affiliation":[]},{"given":"Tudor","family":"Dumitras","sequence":"additional","affiliation":[]},{"given":"Duen Horng","family":"Chau","sequence":"additional","affiliation":[]},{"given":"B. Aditya","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,27]]},"reference":[{"issue":"02","key":"240_CR7","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1017\/S0031182000055360","volume":"85","author":"RM Anderson","year":"1982","unstructured":"Anderson RM, May RM (1982) Coevolution of hosts and parasites. Parasitology 85(02):411\u2013426","journal-title":"Parasitology"},{"issue":"5439","key":"240_CR8","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barabasi","year":"1999","unstructured":"Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"240_CR5","doi-asserted-by":"crossref","unstructured":"Bilge L, Dumitras T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: ACM conference on computer and communications security, Raleigh, NC, Oct 2012","DOI":"10.1145\/2382196.2382284"},{"issue":"1\u20136","key":"240_CR9","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/S1389-1286(00)00083-9","volume":"33","author":"A Broder","year":"2000","unstructured":"Broder A, Kumar R, Maghoul F, Raghavan P, Rajagopalan S, Stata R, Tomkins A, Wiener J (2000) Graph structure in the web. WWW9\/Comput Netw 33(1\u20136):309\u2013320","journal-title":"WWW9\/Comput Netw"},{"key":"240_CR10","unstructured":"Caballero J, Grier C, Kreibich C, Paxson V (2011) Measuring pay-per-install: the commoditization of malware distribution. In: USENIX Security Symposium, USENIX Association"},{"key":"240_CR11","unstructured":"Camp J, Cranor L, Feamster N, Feigenbaum J, Forrest S, Kotz D, Lee W, Lincoln P, Paxson V, Reiter M, Rivest R, Sanders W, Savage S, Smith S, Spafford E, Stolfo S (2009) Data for cybersecurity research: process and \u201cwish list\u201d. http:\/\/www.gtisc.gatech.edu\/files_nsf10\/data-wishlist.pdf , June 2009"},{"key":"240_CR6","doi-asserted-by":"crossref","unstructured":"Chau DH, Nachenberg C, Wilhelm J, Wright A, Faloutsos C (2011) Polonium: tera-scale graph mining and inference for malware detection. SIAM Int Conf Data Min, 2011","DOI":"10.1137\/1.9781611972818.12"},{"issue":"41","key":"240_CR12","doi-asserted-by":"crossref","first-page":"15649","DOI":"10.1073\/pnas.0803685105","volume":"105","author":"R Crane","year":"2008","unstructured":"Crane R, Sornette D (2008) Robust dynamic classes revealed by measuring the response function of a social system. Proc Natl Acad Sci 105(41):15649\u201315653","journal-title":"Proc Natl Acad Sci"},{"key":"240_CR13","doi-asserted-by":"crossref","unstructured":"Crovella M, Bestavros A (1996) Self-similarity in world wide web traffic, evidence and possible causes. Sigmetrics, pp 160\u2013169","DOI":"10.1145\/233008.233038"},{"key":"240_CR14","doi-asserted-by":"crossref","DOI":"10.1145\/1978672.1978683","volume-title":"Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)","author":"T Dumitras","year":"2011","unstructured":"Dumitras T, Shou D (2011) Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE). In: EuroSys BADGERS workshop, Salzburg, Austria"},{"key":"240_CR15","unstructured":"Faloutsos C, Matias Y, Silberschatz A (1996) Modeling skewed distribution using multifractals and the 80-20\u2019 law. Computer Science Department, p 547"},{"key":"240_CR16","doi-asserted-by":"crossref","unstructured":"Faloutsos M, Faloutsos P, Faloutsos C (1999) On power-law relationships of the internet topology. SIGCOMM, pp 251\u2013262, Aug\u2013Sept. 1999","DOI":"10.1145\/316188.316229"},{"key":"240_CR17","doi-asserted-by":"crossref","unstructured":"Gkantsidis C, Karagiannis T, Vojnovic M (2006) Planet scale software updates. In: Rizzo L, Anderson TE, McKeown N (eds) SIGCOMM. ACM, New York, pp 423\u2013434","DOI":"10.1145\/1159913.1159961"},{"issue":"4","key":"240_CR18","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethcote","year":"2000","unstructured":"Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599\u2013653","journal-title":"SIAM Rev"},{"key":"240_CR1","doi-asserted-by":"crossref","unstructured":"Leskovec J, Backstrom L, Kumar R, Tomkins A (2008) Microscopic evolution of social networks. In: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, New York, pp 462\u2013470","DOI":"10.1145\/1401890.1401948"},{"key":"240_CR19","doi-asserted-by":"crossref","unstructured":"Leskovec J, McGlohon M, Faloutsos C, Glance N, Hurst M (2007) Cascading behavior in large blog graphs. arXiv preprint arXiv:0704.2803","DOI":"10.1137\/1.9781611972771.60"},{"key":"240_CR20","doi-asserted-by":"crossref","unstructured":"Levenberg K (1944) A method for the solution of certain non-linear problems in least squares. Q J Appl Math I I(2):164\u2013168","DOI":"10.1090\/qam\/10666"},{"key":"240_CR21","unstructured":"Maggs B (2012) Personal communication"},{"key":"240_CR22","doi-asserted-by":"crossref","unstructured":"Mandelbrot B (1977) Fractals: form, chance, and dimension, vol 1. Freeman, W. H, USA","DOI":"10.1007\/BF03023043"},{"key":"240_CR2","doi-asserted-by":"crossref","unstructured":"Matsubara Y, Sakurai Y, Aditya Prakash B, Li L, Faloutsos C (2012) Rise and fall patterns of information diffusion: model and implications. In: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, New York, pp 6\u201314","DOI":"10.1145\/2339530.2339537"},{"issue":"4","key":"240_CR23","first-page":"33","volume":"1","author":"D Moore","year":"2003","unstructured":"Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N (2003) Inside the Slammer worm. Security & privacy. IEEE 1(4):33\u201339","journal-title":"IEEE"},{"key":"240_CR24","doi-asserted-by":"crossref","unstructured":"Moore D, Shannon C, Claffy KC (2002) Code-red: a case study on the spread and victims of an internet worm. In: Internet measurement workshop. ACM, New York, pp 273\u2013284","DOI":"10.1145\/637201.637244"},{"key":"240_CR3","doi-asserted-by":"crossref","unstructured":"Newman MEJ (2005) Power laws, pareto distributions and zipf\u2019s law. Contemp Phys 46","DOI":"10.1080\/00107510500052444"},{"key":"240_CR25","doi-asserted-by":"crossref","unstructured":"Papalexakis EE, Sidiropoulos ND (2011) Co-clustering as multilinear decomposition with sparse latent factors. In: 2011 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, New York, pp 2064\u20132067","DOI":"10.1109\/ICASSP.2011.5946731"},{"key":"240_CR26","doi-asserted-by":"crossref","unstructured":"Papalexakis EE, Sidiropoulos ND, Bro R (2013) From k-means to higher-way co-clustering: multilinear decomposition with sparse latent factors. IEEE transactions on signal processing","DOI":"10.1109\/TSP.2012.2225052"},{"key":"240_CR27","doi-asserted-by":"crossref","unstructured":"Riedi RH, Crouse MS, Ribeiro VJ, Baraniuk RG (1999) A multifractal wavelet model with application to network traffic. In: IEEE Transactions on information theory, vol 3, April 1999","DOI":"10.1109\/18.761337"},{"key":"240_CR4","unstructured":"Schroeder M (1991) Fractals, chaos, power laws, 6 edn. W. H. Freeman, New York"},{"key":"240_CR28","doi-asserted-by":"crossref","unstructured":"Staniford S, Moore D, Paxson V, Weaver N (2004) The top speed of flash worms. In: Paxson V (ed) WORM. ACM Press, New York, pp 33\u201342","DOI":"10.1145\/1029618.1029624"},{"key":"240_CR29","unstructured":"Staniford S, Paxson V, Weaver N (2002) How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, pp 149\u2013167"},{"key":"240_CR30","unstructured":"Symantec Corporation (2012) Symantec Internet security threat report, vol. 17. http:\/\/www.symantec.com\/threatreport\/ April 2012"},{"issue":"1\/4","key":"240_CR31","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/S0166-5316(02)00108-6","volume":"49","author":"M Wang","year":"2002","unstructured":"Wang M, Ailamaki A, Faloutsos C (2002) Capturing the spatio-temporal behavior of real traffic data. Perform Eval 49(1\/4):147\u2013163","journal-title":"Perform Eval"},{"key":"240_CR32","unstructured":"Wang M, Madhyastha T, Hang Chang N, Papadimitriou S, Faloutsos C (2002) Fast algorithms for modeling bursty traffic. ICDE, Data mining meets performance evaluation"},{"key":"240_CR33","unstructured":"Weaver N, Ellis D (2004) Reflections on Witty: analyzing the attacker; login. USENIX Mag 29(3):34\u201337"},{"key":"240_CR34","volume-title":"Human behavior and principle of least effort: an introduction to human ecology","author":"GK Zipf","year":"1949","unstructured":"Zipf GK (1949) Human behavior and principle of least effort: an introduction to human ecology. Addison Wesley, Cambridge"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0240-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-014-0240-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0240-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,30]],"date-time":"2023-07-30T11:31:20Z","timestamp":1690716680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-014-0240-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,27]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["240"],"URL":"https:\/\/doi.org\/10.1007\/s13278-014-0240-2","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,27]]},"article-number":"240"}}