{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T10:03:45Z","timestamp":1766311425904,"version":"3.44.0"},"reference-count":18,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"am","delay-in-days":227,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["PHY11-19200","NSF PHY-1148698"],"award-info":[{"award-number":["PHY11-19200","NSF PHY-1148698"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1016\/j.future.2018.07.023","type":"journal-article","created":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T08:59:40Z","timestamp":1531904380000},"page":"418-426","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":43,"special_numbering":"C","title":["Anomaly detection in wide area network meshes using two machine learning algorithms"],"prefix":"10.1016","volume":"93","author":[{"given":"James","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1433-9366","authenticated-orcid":false,"given":"Robert","family":"Gardner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0472-3516","authenticated-orcid":false,"given":"Ilija","family":"Vukotic","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2018.07.023_b1","unstructured":"B. Tierney, J. Metzger, J. Boote, E. Boyd, A. Brown, R. Carlson, M. Zekauskas, J. Zurawski, M. Swany, M. Grigoriev, perfsonar: Instantiating a global network measurement framework."},{"issue":"3","key":"10.1016\/j.future.2018.07.023_b2","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10.1016\/j.future.2018.07.023_b3","doi-asserted-by":"crossref","first-page":"3492","DOI":"10.1016\/j.eswa.2010.08.137","article-title":"Real-time anomaly detection systems for denial-of-service attacks by weighted k-nearest-neighbor classifiers","volume":"38","author":"Su","year":"2011","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.future.2018.07.023_b4","doi-asserted-by":"crossref","unstructured":"M. Sakurada, T. Yairi, Anomaly detection using autoencoders with nonlinear dimensionality reduction, in: Proceedings of the MLSDA 2014 2Nd Workshop on Machine Learning for Sensory Data Analysis, MLSDA\u201914, ACM, New York, NY, USA, 2014, pp. 4:4\u20134:11. http:\/\/dx.doi.org\/10.1145\/2689746.2689747.","DOI":"10.1145\/2689746.2689747"},{"issue":"3","key":"10.1016\/j.future.2018.07.023_b5","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","article-title":"Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks","volume":"5","author":"Rajasegarar","year":"2010","journal-title":"Trans. Info. for. Sec."},{"key":"10.1016\/j.future.2018.07.023_b6","doi-asserted-by":"crossref","unstructured":"P. Calyam, J. Pu, W. Mandrawa, A. Krishnamurthy, Ontimedetect: Dynamic network anomaly notification in perfsonar deployments, in: 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2010, pp. 328\u2013337. http:\/\/dx.doi.org\/10.1109\/MASCOTS.2010.41.","DOI":"10.1109\/MASCOTS.2010.41"},{"key":"10.1016\/j.future.2018.07.023_b7","unstructured":"J. Catmore, Ideas on anomaly detection for data quality monitoring. (2016). URL http:\/\/bit.ly\/2GtohJ7."},{"issue":"2","key":"10.1016\/j.future.2018.07.023_b8","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/s10922-013-9286-0","article-title":"Topology-aware correlated network anomaly event detection and diagnosis","volume":"22","author":"Calyam","year":"2014","journal-title":"J. Netw. Syst. Manage."},{"key":"10.1016\/j.future.2018.07.023_b9","doi-asserted-by":"crossref","unstructured":"Y. Zhang, P. Calyam, S. Debroy, M. Sridharan, Pca-based network-wide correlated anomaly event detection and diagnosis, in: 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN), 2015, pp. 149\u2013156. http:\/\/dx.doi.org\/10.1109\/DRCN.2015.7149006.","DOI":"10.1109\/DRCN.2015.7149006"},{"key":"10.1016\/j.future.2018.07.023_b10","doi-asserted-by":"crossref","unstructured":"H.Z. Moayedi, M.A. Masnadi-Shirazi, Arima model for network traffic prediction and anomaly detection, in: 2008 International Symposium on Information Technology, Vol. 4, 2008, pp. 1\u20136. http:\/\/dx.doi.org\/10.1109\/ITSIM.2008.4631947.","DOI":"10.1109\/ITSIM.2008.4631947"},{"key":"10.1016\/j.future.2018.07.023_b11","doi-asserted-by":"crossref","unstructured":"J. Ma, S. Perkins, Time-series novelty detection using one-class support vector machines, in: Proceedings of the International Joint Conference on Neural Networks, 2003. Vol. 3, 2003, pp. 1741\u20131745 vol.3. http:\/\/dx.doi.org\/10.1109\/IJCNN.2003.1223670.","DOI":"10.1109\/IJCNN.2003.1223670"},{"issue":"4","key":"10.1016\/j.future.2018.07.023_b12","first-page":"1507","article-title":"Model selection for high-dimensional, multi-sequence change-point problems","volume":"22","author":"Zhang","year":"2012","journal-title":"Statist. Sinica"},{"issue":"4","key":"10.1016\/j.future.2018.07.023_b13","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","article-title":"Stochastic gradient boosting","volume":"38","author":"Friedman","year":"2002","journal-title":"Comput. Statist. Data Anal."},{"issue":"2","key":"10.1016\/j.future.2018.07.023_b14","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1023\/A:1009869804967","article-title":"Partitioning nominal attributes in decision trees","volume":"3","author":"Coppersmith","year":"1999","journal-title":"Data Min. Knowl. Discov."},{"issue":"1","key":"10.1016\/j.future.2018.07.023_b15","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1006\/jcss.1997.1504","article-title":"A decision-theoretic generalization of on-line learning and an application to boosting","volume":"55","author":"Freund","year":"1997","journal-title":"J. Comput. System Sci."},{"key":"10.1016\/j.future.2018.07.023_b16","unstructured":"D.P. Kingma, J. Ba, Adam A Method for Stochastic Optimization, arXiv e-prints arxiv:1412.6980."},{"key":"10.1016\/j.future.2018.07.023_b17","unstructured":"I. Chattopadhyay, H. Lipson, Data smashing, CoRR abs\/1401.0742 arXiv:1401.0742. URL http:\/\/arxiv.org\/abs\/1401.0742."},{"key":"10.1016\/j.future.2018.07.023_b18","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X18302267?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X18302267?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T04:06:49Z","timestamp":1759118809000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X18302267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":18,"alternative-id":["S0167739X18302267"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2018.07.023","relation":{},"ISSN":["0167-739X"],"issn-type":[{"type":"print","value":"0167-739X"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Anomaly detection in wide area network meshes using two machine learning algorithms","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2018.07.023","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}