{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T02:30:04Z","timestamp":1778034604027,"version":"3.51.4"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T00:00:00Z","timestamp":1473811200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10922-016-9392-x","type":"journal-article","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T13:18:18Z","timestamp":1473859098000},"page":"290-320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Performance Analysis of Network Traffic Predictors in the Cloud"],"prefix":"10.1007","volume":"25","author":[{"given":"Bruno L.","family":"Dalmazo","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[]},{"given":"Marilia","family":"Curado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,14]]},"reference":[{"key":"9392_CR1","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-145","volume-title":"The NIST Definition of Cloud Computing","author":"P Mell","year":"2011","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology, Gaithersburg (2011)"},{"key":"9392_CR2","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/s10922-013-9281-5","volume":"21","author":"P Owezarski","year":"2013","unstructured":"Owezarski, P., Lobo, J., Medhi, D.: Network and service management for cloud computing and data centers: a report on CNSM 2012. J. Netw. Syst. Manag. 21, 707\u2013712 (2013)","journal-title":"J. Netw. Syst. Manag."},{"key":"9392_CR3","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","volume":"26","author":"A Dainotti","year":"2012","unstructured":"Dainotti, A., Pescape, A., Claffy, K.: Issues and future directions in traffic classification. IEEE Netw. 26, 35\u201340 (2012)","journal-title":"IEEE Netw."},{"key":"9392_CR4","unstructured":"Prangchumpol, D.: A network traffic prediction algorithm based on data mining technique. In: Proceedings of World Academy of Science, Engineering and Technology, vol. 79, p. 1196 (2013)"},{"key":"9392_CR5","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/TII.2009.2019127","volume":"5","author":"M Rahmani","year":"2009","unstructured":"Rahmani, M., Tappayuthpijarn, K., Krebs, B., Steinbach, E., Bogenberger, R.: Traffic shaping for resource-efficient in-vehicle communication. IEEE Trans. Ind. Inform. 5, 414\u2013428 (2009)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"9392_CR6","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S1389-1286(01)00304-8","volume":"39","author":"A Sang","year":"2002","unstructured":"Sang, A., Li, S.-Q.: A predictability analysis of network traffic. Comput. Netw. 39, 329\u2013345 (2002)","journal-title":"Comput. Netw."},{"key":"9392_CR7","doi-asserted-by":"crossref","unstructured":"Papadopouli, M., Raftopoulos, E., Shen, H.: Evaluation of short-term traffic forecasting algorithms in wireless networks. In: 2nd Conference on Next Generation Internet Design and Engineering, 2006 (NGI\u201906), pp. 8\u201314. IEEE (2006)","DOI":"10.1109\/NGI.2006.1678229"},{"key":"9392_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, B., He, D., Sun, Z.: Traffic modeling and prediction using ARIMA\/GARCH model. In: Modeling and Simulation Tools for Emerging Telecommunication Networks, pp.\u00a0101\u2013121. Springer, Berlin (2006)","DOI":"10.1007\/0-387-34167-6_5"},{"key":"9392_CR9","doi-asserted-by":"crossref","unstructured":"Salah, K., Elbadawi, K., Boutaba, R.: An analytical model for estimating cloud resources of elastic services. J. Netw. Syst. Manag. 1\u201324 (2015)","DOI":"10.1007\/s10922-015-9352-x"},{"key":"9392_CR10","doi-asserted-by":"crossref","unstructured":"Ballani, H., Costa, P., Karagiannis, T., Rowstron, A.I.: Towards predictable datacenter networks. In: SIGCOMM, vol.\u00a011, pp. 242\u2013253 (2011)","DOI":"10.1145\/2018436.2018465"},{"key":"9392_CR11","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MITP.2009.89","volume":"12","author":"K Vieira","year":"2010","unstructured":"Vieira, K., Schulter, A., Westphall, C., Westphall, C.: Intrusion detection for grid and cloud computing. IT Prof. 12, 38\u201343 (2010)","journal-title":"IT Prof."},{"key":"9392_CR12","doi-asserted-by":"publisher","unstructured":"Plonka, D., Barford, P.: Network anomaly confirmation, diagnosis and remediation. In: 47th Annual Allerton Conference on Communication, Control, and Computing, 2009, pp. 128\u2013135. Allerton (2009). doi: 10.1109\/ALLERTON.2009.5394858","DOI":"10.1109\/ALLERTON.2009.5394858"},{"key":"9392_CR13","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1111\/j.1467-8667.2007.00489.x","volume":"22","author":"Y Xie","year":"2007","unstructured":"Xie, Y., Zhang, Y., Ye, Z.: Short-term traffic volume forecasting using Kalman filter with discrete wavelet decomposition. Comput. Aided Civil Infrastruct. Eng. 22, 326\u2013334 (2007)","journal-title":"Comput. Aided Civil Infrastruct. Eng."},{"key":"9392_CR14","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2013.04.009","volume":"258","author":"W Xiong","year":"2013","unstructured":"Xiong, W., Hu, H., Xiong, N., Yang, L.T., Peng, W.-C., Wang, X., Qu, Y.: Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Inf. Sci. 258, 403\u2013415 (2013)","journal-title":"Inf. Sci."},{"key":"9392_CR15","volume-title":"Cloud Computing: Principles and Paradigms","author":"R Buyya","year":"2010","unstructured":"Buyya, R., Broberg, J., Goscinski, A\u00a0.M.: Cloud Computing: Principles and Paradigms. Wiley, New York (2010)"},{"key":"9392_CR16","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/A:1007608224229","volume":"40","author":"T-S Lim","year":"2000","unstructured":"Lim, T.-S., Loh, W.-Y., Shih, Y.-S.: A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms. Mach. Learn. 40, 203\u2013228 (2000)","journal-title":"Mach. Learn."},{"key":"9392_CR17","doi-asserted-by":"publisher","unstructured":"Dalmazo, B.L., Vilela, J.P., Curado, M.: Predicting traffic in the cloud: a statistical approach. In: Third International Conference on Cloud and Green Computing (CGC\u201913), pp. 121\u2013126 (2013). doi: 10.1109\/CGC.2013.26","DOI":"10.1109\/CGC.2013.26"},{"key":"9392_CR18","doi-asserted-by":"publisher","unstructured":"Dalmazo, B.L., Vilela, J.P., Curado, M.: Online traffic prediction in the cloud: a dynamic window approach. In: The 2nd International Conference on Future Internet of Things and Cloud (FiCloud\u20192014), pp. 9\u201314 (2014). doi: 10.1109\/FiCloud.2014.12","DOI":"10.1109\/FiCloud.2014.12"},{"key":"9392_CR19","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1002\/nem.1934","volume":"26","author":"BL Dalmazo","year":"2016","unstructured":"Dalmazo, B.L., Vilela, J.P., Curado, M.: Online traffic prediction in the cloud. Int. J. Netw. Manag. 26, 269\u2013285 (2016). doi: 10.1002\/nem.1934","journal-title":"Int. J. Netw. Manag."},{"key":"9392_CR20","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.jnca.2013.08.001","volume":"40","author":"N Hoque","year":"2014","unstructured":"Hoque, N., Bhuyan, M.H., Baishya, R., Bhattacharyya, D., Kalita, J.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307\u2013324 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"9392_CR21","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.jnca.2013.08.004","volume":"40","author":"M Whaiduzzaman","year":"2014","unstructured":"Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R.: A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40, 325\u2013344 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"9392_CR22","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/j.jnca.2014.01.015","volume":"42","author":"X Lu","year":"2014","unstructured":"Lu, X., Yu, Z., Guo, B., Zhou, X.: Predicting the content dissemination trends by repost behavior modeling in mobile social networks. J. Netw. Comput. Appl. 42, 197\u2013207 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"9392_CR23","doi-asserted-by":"publisher","unstructured":"Cortez, P., Rio, M., Rocha, M., Sousa, P.: Internet traffic forecasting using neural networks. In: International Joint Conference on Neural Networks, 2006 (IJCNN\u201906), pp. 2635\u20132642 (2006). doi: 10.1109\/IJCNN.2006.247142","DOI":"10.1109\/IJCNN.2006.247142"},{"key":"9392_CR24","doi-asserted-by":"publisher","unstructured":"Dalmazo, B., Cordeiro, W., Rabelo, L., Wickboldt, J., Lunardi, R., dos Santos, R., Gaspary, L., Granville, L., Bartolini, C., Hickey, M.: Leveraging it project lifecycle data to predict support costs. In: IFIP\/IEEE International Symposium on Integrated Network Management (IM\u20192011), pp. 249\u2013256 (2011). doi: 10.1109\/INM.2011.5990698","DOI":"10.1109\/INM.2011.5990698"},{"key":"9392_CR25","doi-asserted-by":"crossref","unstructured":"Dainotti, A., De\u00a0Donato, W., Pescape, A., Salvo\u00a0Rossi, P.: Classification of network traffic via packet-level hidden markov models. In: Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008, New Orleans, Louisiana, pp. 1\u20135 (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.412"},{"key":"9392_CR26","doi-asserted-by":"publisher","unstructured":"Erman, J., Mahanti, A., Arlitt, M.: Qrp05-4: internet traffic identification using machine learning. In: Global Telecommunications Conference, 2006 (GLOBECOM\u201906), pp. 1\u20136. IEEE (2006). doi: 10.1109\/GLOCOM.2006.443","DOI":"10.1109\/GLOCOM.2006.443"},{"key":"9392_CR27","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"T Nguyen","year":"2008","unstructured":"Nguyen, T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Commun. Surv. Tutor. 10, 56\u201376 (2008)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9392_CR28","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.asoc.2011.08.045","volume":"12","author":"Y Chen","year":"2012","unstructured":"Chen, Y., Yang, B., Meng, Q.: Small-time scale network traffic prediction based on flexible neural tree. Appl. Soft Comput. 12, 274\u2013279 (2012)","journal-title":"Appl. Soft Comput."},{"issue":"10","key":"9392_CR29","first-page":"2332","volume":"8","author":"Hongying Jin","year":"2013","unstructured":"Jin, H., Li, L.: Dynamic network traffic flow prediction model based on modified quantum-behaved particle swarm optimization. J. Netw. 8(10), 2332\u20132339 (2013)","journal-title":"J. Netw."},{"key":"9392_CR30","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TNN.2006.883010","volume":"18","author":"T Auld","year":"2007","unstructured":"Auld, T., Moore, A., Gull, S.: Bayesian neural networks for internet traffic classification. IEEE Trans. Neural Netw. 18, 223\u2013239 (2007)","journal-title":"IEEE Trans. Neural Netw."},{"key":"9392_CR31","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.comnet.2008.09.018","volume":"53","author":"P Bermolen","year":"2009","unstructured":"Bermolen, P., Rossi, D.: support vector regression for link load prediction. Comput. Netw. 53, 191\u2013201 (2009). (QoS aspects in next-generation networks)","journal-title":"Comput. Netw."},{"key":"9392_CR32","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815867","volume-title":"Statistical Models: Theory and Practice","author":"D\u00a0A Freedman","year":"2009","unstructured":"Freedman, D.A.: Statistical Models: Theory and Practice. Cambridge University Press, Cambridge (2009)"},{"key":"9392_CR33","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.solener.2004.09.013","volume":"79","author":"JL Torres","year":"2005","unstructured":"Torres, J.L., Garca, A., De Blas, M., De Francisco, A.: Forecast of hourly average wind speed with ARMA models in navarre (Spain). Sol. Energy 79, 65\u201377 (2005)","journal-title":"Sol. Energy"},{"key":"9392_CR34","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.tourman.2007.07.016","volume":"29","author":"H Song","year":"2008","unstructured":"Song, H., Li, G.: Tourism demand modelling and forecastinga review of recent research. Tour. Manag. 29, 203\u2013220 (2008)","journal-title":"Tour. Manag."},{"key":"9392_CR35","doi-asserted-by":"publisher","unstructured":"Zare\u00a0Moayedi, H., Masnadi-Shirazi, M.: Arima model for network traffic prediction and anomaly detection. In: International Symposium on Information Technology, 2008 (ITSim 2008), vol.\u00a04, pp. 1\u20136 (2008). doi: 10.1109\/ITSIM.2008.4631947","DOI":"10.1109\/ITSIM.2008.4631947"},{"key":"9392_CR36","doi-asserted-by":"crossref","unstructured":"Zhao, H.: Multiscale analysis and prediction of network traffic. In: IEEE 28th International on Performance Computing and Communications Conference (IPCCC), pp.\u00a0388\u2013393 (2009)","DOI":"10.1109\/PCCC.2009.5403856"},{"key":"9392_CR37","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1016\/j.ejor.2003.08.037","volume":"160","author":"G Zhang","year":"2005","unstructured":"Zhang, G., Qi, M.: Neural network forecasting for seasonal and trend time series. Eur. J. Oper. Res. 160, 501\u2013514 (2005). (Decision support systems in the internet age)","journal-title":"Eur. J. Oper. Res."},{"key":"9392_CR38","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00500-003-0328-5","volume":"9","author":"Y Jin","year":"2005","unstructured":"Jin, Y.: A comprehensive survey of fitness approximation in evolutionary computation. Soft Comput. 9, 3\u201312 (2005)","journal-title":"Soft Comput."},{"key":"9392_CR39","first-page":"142","volume":"20","author":"W Lee","year":"2012","unstructured":"Lee, W., Chen, C., Chen, K., Chen, T., Liu, C.: A comparative study on the forecast of fresh food sales using logistic regression, moving average and bpnn methods. J. Mar. Sci. Technol. 20, 142\u2013152 (2012)","journal-title":"J. Mar. Sci. Technol."},{"key":"9392_CR40","first-page":"759","volume":"6","author":"A Li","year":"2012","unstructured":"Li, A., Han, Y., Zhou, B., Han, W., Jia, Y.: Detecting hidden anomalies using sketch for high-speed network data stream monitoring. Appl. Math. 6, 759\u2013765 (2012)","journal-title":"Appl. Math."},{"key":"9392_CR41","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s00591-010-0080-8","volume":"58","author":"F Klinker","year":"2011","unstructured":"Klinker, F.: Exponential moving average versus moving exponential average. Math. Semesterber. 58, 97\u2013107 (2011)","journal-title":"Math. Semesterber."},{"key":"9392_CR42","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MIE.2009.934790","volume":"3","author":"B Wilamowski","year":"2009","unstructured":"Wilamowski, B.: Neural network architectures and learning algorithms. IEEE Ind. Electron. Mag. 3, 56\u201363 (2009)","journal-title":"IEEE Ind. Electron. Mag."},{"key":"9392_CR43","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1016\/j.jprocont.2006.06.001","volume":"16","author":"BM Akesson","year":"2006","unstructured":"Akesson, B.M., Toivonen, H.T.: A neural network model predictive controller. J. Process Control 16, 937\u2013946 (2006)","journal-title":"J. Process Control"},{"key":"9392_CR44","doi-asserted-by":"crossref","unstructured":"Li, W., Moore, A.W.: A machine learning approach for efficient traffic classification. In: 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2007 (MASCOTS\u201907). IEEE, pp. 310\u2013317 (2007)","DOI":"10.1109\/MASCOTS.2007.2"},{"issue":"9","key":"9392_CR45","first-page":"855","volume":"4","author":"MF Zhani","year":"2009","unstructured":"Zhani, M.F., Elbiaze, H., Kamoun, F.: Analysis and prediction of real network traffic. J. Netw. 4(9), 855\u2013865 (2009)","journal-title":"J. Netw."},{"key":"9392_CR46","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/s10922-012-9261-1","volume":"22","author":"L Chunlin","year":"2014","unstructured":"Chunlin, L., Layuan, L.: Multi-layer resource management in cloud computing. J. Netw. Syst. Manag. 22, 100\u2013120 (2014)","journal-title":"J. Netw. Syst. Manag."},{"issue":"2","key":"9392_CR47","first-page":"129","volume":"37","author":"C Chatfield","year":"1988","unstructured":"Chatfield, C., Yar, M.: Holt\u2013winters forecasting: some practical issues. J. Roy. Stat. Soc. D-Sta. 37(2), 129\u2013140 (1988)","journal-title":"J. Roy. Stat. Soc. D-Sta."},{"key":"9392_CR48","volume-title":"Handbook of Stochastic Methods","author":"CW Gardiner","year":"1985","unstructured":"Gardiner, C.W., et al.: Handbook of Stochastic Methods, vol. 3. Springer, Berlin (1985)"},{"key":"9392_CR49","volume-title":"Time Series Analysis","author":"W\u00a0W-S Wei","year":"1994","unstructured":"Wei, W\u00a0.W.-S.: Time Series Analysis. Addison-Wesley publ, Reading (1994)"},{"key":"9392_CR50","unstructured":"Joshi, M., Hadi, T.H.: A Review of Network Traffic Analysis and Prediction Techniques (2015). arXiv:1507.05722"},{"key":"9392_CR51","volume-title":"Time Series Prediction: Forecasting the Future and Understanding the Past","year":"1994","unstructured":"Weigend, A.S., Gershenfeld, N.A. (eds.): Time Series Prediction: Forecasting the Future and Understanding the Past. Westview Press, Boulder (1994)"},{"key":"9392_CR52","volume-title":"Forecasting Methods and Applications","author":"S Makridakis","year":"2008","unstructured":"Makridakis, S., Wheelwright, S.C., Hyndman, R.J.: Forecasting Methods and Applications. Wiley, New York (2008)"},{"issue":"8","key":"9392_CR53","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1002\/dac.721","volume":"18","author":"H Yin","year":"2005","unstructured":"Yin, H., Chuang, L., Berton, S., Bo, L., Geyong, M.: Network traffic prediction based on a new time series model. Int. J. Commun. Syst. 18(8), 711\u2013729 (2005)","journal-title":"Int. J. Commun. Syst."},{"key":"9392_CR54","volume-title":"Introduction to Algorithms","author":"T\u00a0H Cormen","year":"2001","unstructured":"Cormen, T\u00a0.H., Leiserson, C\u00a0.E., Rivest, R\u00a0.L.: Introduction to Algorithms. MIT Press, Cambridge (2001)"},{"key":"9392_CR55","unstructured":"Feng, H., Shu, Y.: Study on network traffic prediction techniques. In: Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, 2005, vol.\u00a02, pp. 1041\u20131044. IEEE (2005)"},{"key":"9392_CR56","doi-asserted-by":"crossref","unstructured":"Monahan, J.F.: Some algorithms for the conditional mean vector and covariance matrix. J. Stat. Softw. 16 (2005)","DOI":"10.18637\/jss.v016.i08"},{"key":"9392_CR57","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/49.700909","volume":"16","author":"M Krunz","year":"1998","unstructured":"Krunz, M., Makowski, A.: Modeling video traffic using M\/G\/ $$\\infty$$ \u221e input processes: a compromise between markovian and LRD models. IEEE J. Sel. Areas Commun. 16, 733\u2013748 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"9392_CR58","volume-title":"Computers and Intractability","author":"M\u00a0R Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability. Freeman, San Francisco (1979)"},{"key":"9392_CR59","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.jnca.2014.09.018","volume":"47","author":"R Weingrtner","year":"2015","unstructured":"Weingrtner, R., Brscher, G.B., Westphall, C.B.: Cloud resource management: a survey on forecasting and profiling models. J. Netw. Comput. Appl. 47, 99\u2013106 (2015)","journal-title":"J. Netw. Comput. Appl."},{"key":"9392_CR60","doi-asserted-by":"crossref","first-page":"2093","DOI":"10.1016\/j.comnet.2013.04.001","volume":"57","author":"G Aceto","year":"2013","unstructured":"Aceto, G., Botta, A., de Donato, W., Pescap, A.: Cloud monitoring: a survey. Comput. Netw. 57, 2093\u20132115 (2013)","journal-title":"Comput. Netw."},{"key":"9392_CR61","doi-asserted-by":"crossref","unstructured":"Drago, I., Mellia, M., Munaf\u00f2, M.M., Sperotto, A., Sadre, R., Pras, A.: Inside dropbox: understanding personal cloud storage services. In: Proceedings of the 12th ACM SIGCOMM Conference on Internet Measurement (IMC\u201912), Berlin, Germany, pp.\u00a0481\u2013494 (2012)","DOI":"10.1145\/2398776.2398827"},{"key":"9392_CR62","doi-asserted-by":"publisher","unstructured":"Benson, T., Akella, A., Maltz, D.A.: Network traffic characteristics of data centers in the wild. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC\u201910), pp. 267\u2013280. ACM, New York, NY, USA (2010). doi: 10.1145\/1879141.1879175","DOI":"10.1145\/1879141.1879175"},{"key":"9392_CR63","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36, 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"9392_CR64","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.1016\/j.csda.2007.07.020","volume":"52","author":"A McLeod","year":"2008","unstructured":"McLeod, A., Zhang, Y.: Faster ARMA maximum likelihood estimation. Comput. Stat. Data Anal. 52, 2166\u20132176 (2008)","journal-title":"Comput. Stat. Data Anal."},{"key":"9392_CR65","first-page":"1","volume":"26","author":"RJ Hyndman","year":"2008","unstructured":"Hyndman, R.J., Khandakar, Y.: Automatic time series forecasting: the forecast package for R. J. Stat. Softw. 26, 1\u201322 (2008)","journal-title":"J. Stat. Softw."},{"key":"9392_CR66","volume-title":"R: A Language and Environment for Statistical Computing","author":"RC Team","year":"2012","unstructured":"R.C. Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, R.C. Team, Vienna (2012)"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-016-9392-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-016-9392-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-016-9392-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T13:32:33Z","timestamp":1568381553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-016-9392-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,14]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["9392"],"URL":"https:\/\/doi.org\/10.1007\/s10922-016-9392-x","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,14]]}}}