{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T04:10:09Z","timestamp":1748059809577,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622005","type":"proceedings-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T22:07:18Z","timestamp":1548367638000},"page":"3841-3846","source":"Crossref","is-referenced-by-count":5,"title":["Achieving Horizontal Scalability in Density-based Clustering for URLs"],"prefix":"10.1109","author":[{"given":"Azadeh","family":"Faroughi","sequence":"first","affiliation":[]},{"given":"Reza","family":"Javidan","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mellia","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Morichetta","sequence":"additional","affiliation":[]},{"given":"Francesca","family":"Soro","sequence":"additional","affiliation":[]},{"given":"Martino","family":"Trevisan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737792"},{"key":"ref11","article-title":"Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2016.57"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.3390\/rs9121301","article-title":"Research on the parallelization of the dbscan clustering algorithm for spatial data mining based on the spark platform","volume":"9","author":"huang","year":"2017","journal-title":"Remote Sensing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2427036.2427038"},{"key":"ref15","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14778\/3021924.3021932"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.85"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.12"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ITC-28.2016.146"},{"key":"ref28","article-title":"Design and optimization of dbscan algorithm based on cuda","author":"wang","year":"2015","journal-title":"arXiv preprint arXiv 1506 03857"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004227"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600756CM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2597443"},{"key":"ref6","first-page":"160","article-title":"Density-based clustering based on hierarchical density estimates","author":"campello","year":"2013","journal-title":"Pacific-Asia Conf on Knowledge Discovery and Data Mining"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963468"},{"key":"ref8","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proceedings of the International Conference on Knowledge Discovery and Data Mining"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1109\/HPCSim.2015.7237086","author":"cordova","year":"2015","journal-title":"High Performance Computing & Simulation (HPCS) 2015 International Conf on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.031"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/b15410"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITC30.2018.00035"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503255"},{"volume":"1","journal-title":"Forecast and methodology 2016-2021","year":"2016","key":"ref21"},{"key":"ref24","first-page":"144","article-title":"Firma: Malware clustering and network signature generation with mixed network behaviors","author":"rafique","year":"2013","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"key":"ref23","first-page":"14","article-title":"Behavioral clustering of http-based malware and signature generation using malicious network traces","volume":"10","author":"perdisci","year":"2010","journal-title":"NSDI"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212060"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2018,12,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622005.pdf?arnumber=8622005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:30:51Z","timestamp":1643221851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622005","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}