{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:23:01Z","timestamp":1729628581231,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icccn.2017.8038520","type":"proceedings-article","created":{"date-parts":[[2017,9,18]],"date-time":"2017-09-18T16:33:46Z","timestamp":1505752426000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A New Approach to Online, Multivariate Network Traffic Analysis"],"prefix":"10.1109","author":[{"given":"Jinoh","family":"Kim","sequence":"first","affiliation":[]},{"given":"Alex","family":"Sim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"66:1","DOI":"10.1145\/2766963","article-title":"Convolutional wasserstein distances: Efficient optimal transportation on geometric domains","volume":"34","author":"solomon","year":"2015","journal-title":"ACM Trans Graph"},{"key":"ref31","first-page":"3312","article-title":"Principal geodesic analysis for probability measures under the optimal transport metric","author":"seguy","year":"2015","journal-title":"Advances in Neural Information Processing Systems 28 Annual Conference on Neural Information Processing Systems 2015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028814"},{"key":"ref36","first-page":"29","article-title":"Software defined traffic measurement with opensketch","author":"yu","year":"2013","journal-title":"Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation nsdi'13"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281630"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/304182.304199"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398363"},{"key":"ref11","first-page":"106","article-title":"A general method for scaling up machine learning algorithms and its application to clustering","author":"domingos","year":"2001","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199557"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015495"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380841"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1198387"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892124"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/376284.375680"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876207"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-47534-9_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"},{"journal-title":"KDD Cup 1999 data","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544024"},{"key":"ref29","article-title":"Gt: picking up the truth from the ground for internet traffic","volume":"39","author":"rgringoli","year":"2009","journal-title":"ACM SIGCOMM ComputerCommunication Review"},{"key":"ref5","first-page":"635","article-title":"Maintaining stream statistics over sliding windows","author":"babcock","year":"2002","journal-title":"ACM-SIAM Symposium on Discrete Algorithms (SODA)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.231"},{"key":"ref7","article-title":"Relational dynamic bayesian networks with locally exchangeable measures","author":"choi","year":"2013","journal-title":"LBNL Technical Report LBNL-6341E"},{"year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687653"},{"journal-title":"Cisco white paper Cisco vni forecast and methodology 2015&#x2013;2020","year":"0","key":"ref1"},{"key":"ref20","article-title":"A lightweight network anomaly detection technique","author":"kim","year":"2017","journal-title":"Proceedings of the International Workshop on Computing Networking and Communications (in conjunction with ICNC 2017)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815679"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"journal-title":"The Spread of the Sapphire\/Slammer Worm","year":"2003","author":"moore","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/276305.276344"}],"event":{"name":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","start":{"date-parts":[[2017,7,31]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2017,8,3]]}},"container-title":["2017 26th International Conference on Computer Communication and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8038296\/8038338\/08038520.pdf?arnumber=8038520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T12:47:21Z","timestamp":1570106841000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8038520\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icccn.2017.8038520","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}