{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:51:14Z","timestamp":1771699874627,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/cogsima.2013.6523859","type":"proceedings-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T16:53:39Z","timestamp":1371142419000},"page":"285-292","source":"Crossref","is-referenced-by-count":5,"title":["Detecting anomalous network traffic in organizational private networks"],"prefix":"10.1109","author":[{"given":"R.","family":"Vaarandi","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/986655.986657"},{"key":"18","first-page":"261","article-title":"Methods for Detecting Important Events and Knowledge from Data Security Logs","author":"vaarandi","year":"0","journal-title":"Proceedings of 10th European Conference on Information Warfare and Security 2011"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2012.6193518"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575281"},{"key":"13","first-page":"28","article-title":"Machine Learning Approach for IP-Flow Record Anomaly Detection","author":"wagner","year":"0","journal-title":"Proc of IFIP TC 6 Conference on Networking 2011"},{"key":"14","article-title":"Traffic Anomaly Detection Using K-Means Clustering","author":"mu?nz","year":"0","journal-title":"Proceedings of Leistungs- Zuverla?ssigkeits- und Verla?sslichkeitsbewertung Von Kommunikationsnetzen und Verteilten Systemen 4 GI\/ITG-Workshop MMBnet 2007"},{"key":"11","first-page":"241","article-title":"Community-based Analysis of Netflow for Early Detection of Security Incidents","author":"weigert","year":"0","journal-title":"Proceedings of 25th USENIX Large Installation Systems Administration Conference 2011"},{"key":"12","first-page":"49","article-title":"Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes","author":"bartos?","year":"0","journal-title":"Proceedings of CESNET Conference 2008"},{"key":"3","year":"0"},{"key":"2","year":"0"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644897"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2005.35"},{"key":"6","first-page":"119","article-title":"Nfsight: NetFlow-based Network Awareness Tool","author":"berthier","year":"0","journal-title":"Proceedings of 24th USENIX Large Installation Systems Administration Conference 2010"},{"key":"5","first-page":"121","article-title":"More NetFlow Tools: For Performance and Security","author":"gates","year":"0","journal-title":"Proceedings of 18th USENIX Large Installation Systems Administration Conference 2004"},{"key":"4","first-page":"291","article-title":"The OSU Flow-tools Package and Cisco NetFlow Logs","author":"fullmer","year":"0","journal-title":"Proceedings of 14th USENIX Large Installation Systems Administration Conference 2000"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090604"},{"key":"8","first-page":"2541","article-title":"DoWitcher: Effective Worm Detection and Containmenr in the Internet Core","author":"ranjan","year":"0","journal-title":"Proceedings of 26th IEEE International Conference on Computer Communications 2007"}],"event":{"name":"2013 IEEE International Multi-Cognitive Methods in SituationDisciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2013)","location":"San Diego, CA","start":{"date-parts":[[2013,2,25]]},"end":{"date-parts":[[2013,2,28]]}},"container-title":["2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6520997\/6523810\/06523859.pdf?arnumber=6523859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:24:32Z","timestamp":1490221472000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6523859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2013.6523859","relation":{},"subject":[],"published":{"date-parts":[[2013,2]]}}}