{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:39:32Z","timestamp":1729676372252,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/ccis.2014.7175718","type":"proceedings-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T18:40:39Z","timestamp":1439404839000},"page":"140-145","source":"Crossref","is-referenced-by-count":2,"title":["Hadoop-based network traffic anomaly detection in backbone"],"prefix":"10.1109","author":[{"family":"Jishen Yu","sequence":"first","affiliation":[]},{"family":"Feng Liu","sequence":"additional","affiliation":[]},{"family":"Wenli Zhou","sequence":"additional","affiliation":[]},{"family":"Hua Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"606","article-title":"Mining surprising patterns using temporal description length[C]","author":"chakrabarti","year":"1998","journal-title":"Proc the 28th International Conference on Very Large Data Bases"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775148"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2514\/3.23937"},{"key":"ref13","first-page":"151","article-title":"Mining multivariate time-series sensor data to discover behavior envelopes[C]","author":"decoste","year":"1997","journal-title":"Proceedings of the Conference on Knowledge Discovery and Data Mining"},{"key":"ref14","first-page":"102","article-title":"Mining deviants in a time series database[C]","author":"jagadish","year":"1999","journal-title":"Proc the 28th International Conference on Very Large Data Bases"},{"journal-title":"The Theory and Applications of Internet Measurement","year":"2009","author":"yang","key":"ref15"},{"journal-title":"Modeling Internet traffic Performance limits","year":"2006","author":"hassan","key":"ref16"},{"key":"ref4","first-page":"115","article-title":"The analyzer of internet traffic model and commentary[J]","volume":"22","author":"bin","year":"2011","journal-title":"Journal of Software"},{"key":"ref3","first-page":"719","article-title":"The extract of network traffic anomaly detection classifier and the research of training method[J]","volume":"35","author":"yiming","year":"2012","journal-title":"Journal of Computer Science and Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223670"},{"key":"ref5","first-page":"82","article-title":"Novelty detection in time series data using ideas from immunology[C]","author":"asgupta","year":"1996","journal-title":"Proc of the 5th International Conference on Intelligent Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0303-2647(00)00131-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/956804.956828"},{"key":"ref2","first-page":"170","article-title":"Network traffic anomaly detection based on a fast algorithm of the instantaneous frequency[j]","author":"fei","year":"2013","journal-title":"Bulletin of Science and Technology"},{"key":"ref1","first-page":"1007","article-title":"Network traffic models and the found of abnormal traffic based on statistical[J]","volume":"17","author":"bing","year":"2007","journal-title":"High Technology Letters"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/SSDM.2000.869778","article-title":"TS A-Tree: a wavelet-based approach to improve the efficiency of multi-level surprise and trend queries[C]","author":"shahabi","year":"2000","journal-title":"Proc of the 12th International Conference on Scientific and Statistical Database Management"}],"event":{"name":"2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2014,11,27]]},"location":"Shenzhen, China","end":{"date-parts":[[2014,11,29]]}},"container-title":["2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7168380\/7175692\/07175718.pdf?arnumber=7175718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T13:31:44Z","timestamp":1498224704000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7175718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ccis.2014.7175718","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}