{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:45:23Z","timestamp":1760708723508,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6824985","type":"proceedings-article","created":{"date-parts":[[2014,6,16]],"date-time":"2014-06-16T21:53:24Z","timestamp":1402955604000},"page":"194-199","source":"Crossref","is-referenced-by-count":6,"title":["Massive distributed and parallel log analysis for organizational security"],"prefix":"10.1109","author":[{"family":"Xiaokui Shu","sequence":"first","affiliation":[]},{"given":"John","family":"Smiy","sequence":"additional","affiliation":[]},{"family":"Danfeng Yao","sequence":"additional","affiliation":[]},{"family":"Heshan Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"197","article-title":"Web spam detection using MapReduce approach to collective classification","author":"indyk","year":"2013","journal-title":"International Joint Conference CISIS12-ICEUTE? 12-SOCO?"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367563"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2011.6020074"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1998.709980"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"journal-title":"Append to Files in HDFS","year":"2007","key":"13"},{"journal-title":"Enable Sync by Default and Disable Append","year":"2013","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123125"},{"journal-title":"Apache Apache Hadoop","year":"0","key":"12"},{"key":"21","article-title":"Cloudbased anti-malware solution","author":"al-taharwa","year":"2011","journal-title":"Proceedings of the 2011 International Symposium on Grids and Clouds (ISGC)"},{"key":"20","first-page":"115","article-title":"In-situ MapReduce for log processing","author":"logothetis","year":"2011","journal-title":"USENIX Annual Technical Conference (USENIX) 2011"},{"journal-title":"Symantec Symantec cloud","year":"0","key":"22"},{"journal-title":"T Micro Trend Micro Smart Protection Network","year":"0","key":"23"},{"key":"24","first-page":"91","article-title":"CloudAV: N-version antivirus in the network cloud","author":"oberheide","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"25","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-642-10772-6_14","article-title":"A framework for behaviorbased malware analysis in the cloud","author":"martignoni","year":"2009","journal-title":"Information Systems Security"},{"key":"26","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/HPCS.2010.5547135","article-title":"Elastic stream cloud (ESC): A stream-oriented cloud computing platform for rich Internet application","author":"feng","year":"2010","journal-title":"High Performance Computing and Simulation (HPCS) 2010 International Conference On IEEE"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2011.62"},{"key":"3","first-page":"104","article-title":"User intentionbased traffic dependence analysis for anomaly detection Security and privacy workshops (SPW) 2012","author":"zhang","year":"2012","journal-title":"IEEE Symposium on Security and Privacy IEEE"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.10"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/NOMSW.2010.5486551"},{"key":"1","article-title":"Enriching intrusion alerts through multi-host causality","author":"king","year":"2005","journal-title":"Proceedings of the 2005 Network and Distributed System Security Symposium (NDSS)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045076"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382232"},{"key":"5","first-page":"222","article-title":"Data leak detection as a service","volume":"106","author":"shu","year":"2012","journal-title":"SecureComm Ser Lecture Notes of the Institute for Computer Sciences"},{"key":"4","first-page":"57","article-title":"Detecting infection onset with behavior-based policies","author":"xu","year":"2011","journal-title":"Network and System Security (NSS) 2011 5th International Conference On IEEE"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982226"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32885-5_22"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06824985.pdf?arnumber=6824985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:59:17Z","timestamp":1498129157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6824985","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}