{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:18:03Z","timestamp":1766578683514,"version":"3.37.3"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council (EPSRC) through the BT Prosperity Partnership Project: Next Generation Converged Digital Infrastructure","doi-asserted-by":"publisher","award":["EP\/R004935\/1"],"award-info":[{"award-number":["EP\/R004935\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3050014","type":"journal-article","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T22:37:00Z","timestamp":1610231820000},"page":"8997-9011","source":"Crossref","is-referenced-by-count":11,"title":["Mining Graph-Fourier Transform Time Series for Anomaly Detection of Internet Traffic at Core and Metro Networks"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9662-0017","authenticated-orcid":false,"given":"Manuel","family":"Herrera","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0591-1095","authenticated-orcid":false,"given":"Yaniv","family":"Proselkov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9697-3672","authenticated-orcid":false,"given":"Marco","family":"Perez-Hernandez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6214-1739","authenticated-orcid":false,"given":"Ajith Kumar","family":"Parlikad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"11","article-title":"Exploring network structure, dynamics, and function using networkx","author":"hagberg","year":"2008","journal-title":"Proc 7th Python Sci Conf (SciPy)"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1007\/978-3-319-55914-8_22"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1007\/978-3-540-39804-2_40"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1109\/ICDM.2016.0179"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1007\/s10898-007-9198-1"},{"year":"2016","author":"barab\u00e1si","journal-title":"Network Science","key":"ref77"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1137\/S003614450342480"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.3390\/s20092655"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1016\/j.physrep.2005.10.009"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1364\/JON.7.000928"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.3390\/pr8030312"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1145\/1807167.1807188"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1103\/PhysRevE.88.062816"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1093\/comnet\/cnv005"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1137\/16M1066142"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1103\/RevModPhys.87.925"},{"key":"ref37","first-page":"1","author":"winther","year":"2006","journal-title":"Tier 1 ISPs What they are and why they are important"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.comcom.2018.07.028"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.comnet.2009.11.002"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.physrep.2016.04.005"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1214\/14-AOAS742"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1007\/s10618-007-0064-z"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1016\/j.is.2015.04.007"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1109\/ICDM.2017.66"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1017\/CBO9781107415874"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1007\/s10618-017-0519-9"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1017\/CBO9780511780356"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1109\/ICDM.2002.1183925"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1109\/ICDM.2005.79"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1017\/CBO9780511921681"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.14778\/3137765.3137784"},{"key":"ref68","first-page":"1","article-title":"Time is of the essence: Machine learning-based intrusion detection in industrial time series data","author":"anton","year":"2018","journal-title":"Proc of IEEE Intl Conf on Data Mining (ICDM"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1109\/ICDM.2016.0085"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.2172\/1414058"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s10550-007-0060-2"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/79.998081"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1364\/AO.43.000153"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/MCOM.2003.1179494"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s10922-014-9335-3"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1364\/OAA.2006.OTuA4"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1002\/lpor.201800111"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.sigpro.2016.03.014"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1103\/PhysRevE.87.052812"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1016\/j.neucom.2017.04.042"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1111\/j.1467-9892.2011.00766.x"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1002\/widm.1199"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.3934\/nhm.2008.3.345"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1007\/978-3-030-03574-7_1"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1016\/j.acha.2015.02.005"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1103\/PhysRevX.8.041043"},{"key":"ref53","first-page":"12","article-title":"The Laplacian spectrum of graphs","volume":"2","author":"mohar","year":"1991","journal-title":"Graph Theory and Combinatorics"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/ICCSN.2011.6014631"},{"year":"2019","author":"goldman","article-title":"Evaluating and mapping Internet connectivity in the United States","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/JSEN.2017.2733767"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1073\/pnas.200327197"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-981-13-3462-7"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1002\/ett.2774"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/1290168.1290173"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/COMST.2016.2558818"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/JPROC.2018.2820126"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MCAS.2003.1228503"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/EIT.2017.8053409"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s10618-019-00668-6"},{"key":"ref80","article-title":"Efficient matrix profile computation using different distance functions","author":"akbarinia","year":"2019","journal-title":"arXiv 1901 05708"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-319-77492-3_15"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/B978-0-12-813365-1.00009-6"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/RAIT.2012.6194508"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1002\/9780470683576"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2785956.2787499"},{"key":"ref7","first-page":"1","article-title":"Spectral analysis of backbone networks against targeted attacks","author":"shatto","year":"2017","journal-title":"Proc Design Reliable Commun Netw 13th Int Conf"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1103\/PhysRevLett.86.3200"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1038\/s41567-018-0072-5"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/JETCAS.2017.2671354"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/s11071-017-3554-6"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1126\/science.286.5439.509"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1007\/978-3-642-30507-8_9"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1038\/30918"},{"key":"ref41","first-page":"107","author":"latora","year":"2017","journal-title":"Small Worlds Networks"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/MNET.2017.1700086"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1016\/j.neunet.2019.01.002"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09316656.pdf?arnumber=9316656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:03Z","timestamp":1639770963000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9316656\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":80,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3050014","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}