{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:27:51Z","timestamp":1771957671686,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Department of National Defence (DND)\/Natural Sciences and Engineering Research Council of Canada (NSERC) Discovery Grant Supplement for 2019","doi-asserted-by":"publisher","award":["DGDND-2019-06866"],"award-info":[{"award-number":["DGDND-2019-06866"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3197651","type":"journal-article","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T19:50:29Z","timestamp":1659988229000},"page":"85792-85817","source":"Crossref","is-referenced-by-count":14,"title":["Tensor-Based Online Network Anomaly Detection and Diagnosis"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5447-3829","authenticated-orcid":false,"given":"Mehdi","family":"Shajari","sequence":"first","affiliation":[{"name":"The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8072-9157","authenticated-orcid":false,"given":"Hongxiang","family":"Geng","sequence":"additional","affiliation":[{"name":"The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1144-4232","authenticated-orcid":false,"given":"Kaixuan","family":"Hu","sequence":"additional","affiliation":[{"name":"The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9888-0389","authenticated-orcid":false,"given":"Alberto","family":"Leon-Garcia","sequence":"additional","affiliation":[{"name":"The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, Toronto, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2019.1617160"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090604"},{"key":"ref3","volume-title":"Spade, Silicon Defense","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.28"},{"key":"ref5","article-title":"Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert systems (NIDES)","author":"Anderson","year":"1995"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952601"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/.2006.1629454"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2008.555"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6059996"},{"issue":"2","key":"ref14","first-page":"49","article-title":"Setting a worm attack warning by using machine learning to classify netflow data","volume":"36","author":"Abdulla","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720582"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD.2018.8396200"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691265"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323688"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101603"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NCA51143.2020.9306732"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-92bf1922-00a"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.004"},{"key":"ref27","volume-title":"Surge in Exploit Attempts for Netis Router Backdoor (UDP\/53413)","year":"2016"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09852451.pdf?arnumber=9852451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:07:38Z","timestamp":1706789258000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9852451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3197651","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}