{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T00:06:12Z","timestamp":1756339572249,"version":"3.44.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cnsm.2010.5691265","type":"proceedings-article","created":{"date-parts":[[2011,1,17]],"date-time":"2011-01-17T16:12:04Z","timestamp":1295280724000},"page":"463-468","source":"Crossref","is-referenced-by-count":5,"title":["Game theory driven monitoring of spatial-aggregated IP-Flow records"],"prefix":"10.1109","author":[{"given":"Cynthia","family":"Wagner","sequence":"first","affiliation":[{"name":"University of Luxembourg, FSTC, SECAN-Lab, Luxembourg"}]},{"given":"Gerard","family":"Wagener","sequence":"additional","affiliation":[{"name":"University of Luxembourg, FSTC, SECAN-Lab, Luxembourg"}]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[{"name":"University of Luxembourg, FSTC, SECAN-Lab, Luxembourg"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"University of Luxembourg, FSTC, SECAN-Lab, Luxembourg"}]},{"given":"Alexandre","family":"Dulaunoy","sequence":"additional","affiliation":[{"name":"SES-S.A., Luxembourg"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45235-5_83"},{"key":"ref11","article-title":"Detection of Denial of Service attacks using AGURI","author":"kaizaki","year":"2002","journal-title":"International Conference Telecommunications ICT2002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080119"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-00975-4_2","article-title":"Quantifying the Extent of IPv6 Deployment","volume":"5448","author":"karpilovsky","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312212"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1006\/game.1995.1023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01645-5_4"},{"journal-title":"Machine learning for application-layer intrusion detection","year":"2009","author":"rieck","key":"ref18"},{"key":"ref19","article-title":"Traffic Accounting Using Netflow and Cflowd","author":"sabatino","year":"1998","journal-title":"Fourth International Symposium on Interworking"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1021\/ie070589b"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BDIM.2008.4540082"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.05.004"},{"key":"ref5","first-page":"222","article-title":"Aguri: An aggregation-based traffic profiler","author":"cho","year":"2001","journal-title":"QoflS 2001"},{"year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015495"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"journal-title":"Matrix Games and Nash Equilibrium Lecture in Game-theoretic Artificial Intelligence","year":"2007","author":"greenwald","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"ref20","article-title":"A framework for predicting security and dependability measures in real-time","volume":"7","author":"sallhammar","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref22","first-page":"164","article-title":"Hidden Markov Model modeling of SSH brute-force attacks","author":"sperotto","year":"2009","journal-title":"Integrated Management of Systems Services Processes and People in IT Proceedings of the 20th IFIP\/IEEE International Workshop on Distributed Systems Operations and Management DSOM 2009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637226"},{"journal-title":"Statistical Learning Theory","year":"1998","author":"vapnik","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2004.04.003"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.05.004"}],"event":{"name":"2010 International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2010,10,25]]},"location":"Niagara Falls, ON, Canada","end":{"date-parts":[[2010,10,29]]}},"container-title":["2010 International Conference on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5668576\/5691186\/05691265.pdf?arnumber=5691265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T18:23:35Z","timestamp":1756319015000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5691265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2010.5691265","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}