{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T09:42:04Z","timestamp":1648719724485},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11227-016-1743-6","type":"journal-article","created":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T16:17:02Z","timestamp":1463242622000},"page":"4107-4128","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["High-performance network traffic analysis for continuous batch intrusion detection"],"prefix":"10.1007","volume":"72","author":[{"given":"Ricardo","family":"Morla","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Gon\u00e7alves","sequence":"additional","affiliation":[]},{"given":"Jorge G.","family":"Barbosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"1743_CR1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.future.2014.07.002","volume":"41","author":"A Stephen McGough","year":"2014","unstructured":"Stephen McGough A, Forshaw M, Gerrard C, Wheater S, Allen B, Robinson P (2014) Comparison of a cost-effective virtual cloud cluster with an existing campus cluster. Future Gen Comput Syst 41:65\u201378","journal-title":"Future Gen Comput Syst"},{"issue":"3","key":"1743_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2602571","volume":"13","author":"T Guo","year":"2014","unstructured":"Guo T, Sharma U, Shenoy P, Wood T, Sahu S (2014) Cost-aware cloud bursting for enterprise applications. ACM Trans Internet Technol 13(3):1\u201324","journal-title":"ACM Trans Internet Technol"},{"key":"1743_CR3","doi-asserted-by":"crossref","unstructured":"Nair SK et al (2010) Towards secure cloud bursting, brokerage and aggregation. In: Proceedings of the 8th IEEE European conference on web services, ECOWS 2010, pp 189\u2013196","DOI":"10.1109\/ECOWS.2010.33"},{"issue":"1","key":"1743_CR4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2427036.2427038","volume":"43","author":"Y Lee","year":"2012","unstructured":"Lee Y, Lee Y (2012) Toward scalable internet traffic measurement and analysis with Hadoop. ACM SIGCOMM Comput Commun Rev 43(1):5\u201313","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"1743_CR5","unstructured":"RIPE (2012) Large-scale PCAP data analysis using Apache Hadoop. https:\/\/github.com\/RIPE-NCC\/hadoop-pcap"},{"issue":"3","key":"1743_CR6","first-page":"854","volume":"2","author":"A Pallavi","year":"2012","unstructured":"Pallavi A, Hemlata P (2012) Network traffic analysis using packet sniffer. Int J Eng Res Appl 2(3):854\u2013856","journal-title":"Int J Eng Res Appl"},{"key":"1743_CR7","doi-asserted-by":"crossref","unstructured":"Bicer T, Chiu D, Agrawal G (2011) A framework for data-intensive computing with cloud bursting. 2011 IEEE international conference on cluster computing, pp 169\u2013177","DOI":"10.1109\/CLUSTER.2011.21"},{"issue":"3","key":"1743_CR8","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TCC.2014.2316810","volume":"2","author":"S Kailasam","year":"2014","unstructured":"Kailasam S, Dhawalia P, Balaji SJ, Iyer G, Dharanipragada J (2014) Extending MapReduce across clouds with BStream. IEEE Trans Cloud Comput 2(3):362\u2013376","journal-title":"IEEE Trans Cloud Comput"},{"key":"1743_CR9","doi-asserted-by":"crossref","unstructured":"Chang H, Kodialam M, Kompella RR, Lakshman TV, Lee M, Mukherjee S (2011) Scheduling in mapreduce-like systems for fast completion time. IEEE INFOCOM, pp 3074\u20133082","DOI":"10.1109\/INFCOM.2011.5935152"},{"key":"1743_CR10","doi-asserted-by":"crossref","unstructured":"Mattess M, Calheiros RN, Buyya R (2013) Scaling MapReduce applications across hybrid clouds to meet soft deadlines. International conference on advanced information networking and applications, pp 629\u2013636","DOI":"10.1109\/AINA.2013.51"},{"key":"1743_CR11","doi-asserted-by":"crossref","unstructured":"Verma A, Cherkasova L, Kumar VS, Campbell RH (2012) Deadline-based workload management for MapReduce environments: pieces of the performance puzzle. In: Proceedings of network operations and management symposium, pp 900\u2013905","DOI":"10.1109\/NOMS.2012.6212006"},{"key":"1743_CR12","doi-asserted-by":"crossref","unstructured":"Dong X, Wang Y, Liao H (2011) Scheduling mixed real-time and non-real-time applications in MapReduce environment. International conference on parallel and distributed systems, pp 9\u201316","DOI":"10.1109\/ICPADS.2011.115"},{"key":"1743_CR13","doi-asserted-by":"crossref","unstructured":"Hwang E, Kim KH (2012) Minimizing cost of virtual machines for deadline-constrained MapReduce applications in the cloud international conference on grid computing, pp 130\u2013138","DOI":"10.1109\/Grid.2012.19"},{"key":"1743_CR14","doi-asserted-by":"crossref","unstructured":"Kc K, Anyanwu K (2010) Scheduling hadoop jobs to meet deadlines. In: Proceedings of IEEE second international conference on cloud computing technology and science, Indianapolis, pp 388\u2013392","DOI":"10.1109\/CloudCom.2010.97"},{"key":"1743_CR15","doi-asserted-by":"crossref","unstructured":"Lim N, Majumdar S, Ashwood-Smith P (2014) A constraint programming-based resource management technique for processing MapReduce jobs with SLAs on clouds. International conference on parallel processing (ICPP), pp 411\u2013421","DOI":"10.1109\/ICPP.2014.50"},{"key":"1743_CR16","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-319-19419-6_2","volume":"522","author":"P Gaj","year":"2015","unstructured":"Gaj P, Kwiecie A, Stera P (2015) Estimating the intensity of long-range dependence in real and synthetic traffic traces. Springer Comput Netw 522:11\u201322","journal-title":"Springer Comput Netw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1743-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-016-1743-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1743-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-016-1743-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T17:42:43Z","timestamp":1567878163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-016-1743-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":16,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["1743"],"URL":"https:\/\/doi.org\/10.1007\/s11227-016-1743-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,14]]}}}