{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:40:58Z","timestamp":1729665658943,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/iccnc.2017.7876207","type":"proceedings-article","created":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T04:16:38Z","timestamp":1489464998000},"page":"656-661","source":"Crossref","is-referenced-by-count":6,"title":["An approach to online network monitoring using clustered patterns"],"prefix":"10.1109","author":[{"given":"Jinoh","family":"Kim","sequence":"first","affiliation":[]},{"given":"Alex","family":"Sim","sequence":"additional","affiliation":[]},{"given":"Sang C.","family":"Suh","sequence":"additional","affiliation":[]},{"given":"Ikkyun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"ref11","first-page":"333","article-title":"Unsupervised anomaly detection in network intrusion detection using clusters","author":"leung","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref13","article-title":"The dynamic hungarian algorithm for the assignment problem with changing costs","author":"mills-tettey","year":"2007","journal-title":"Technical Report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.72"},{"key":"ref15","first-page":"5","article-title":"Intrusion detection with unlabeled data using clustering","author":"portnoy","year":"2001","journal-title":"Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001"},{"key":"ref16","article-title":"Gt: picking up the truth from the ground for internet traffic","volume":"39","author":"rgringoli","year":"2009","journal-title":"ACM SIGCOMM ComputerCommunication Review"},{"key":"ref17","first-page":"29","article-title":"Software defined traffic measurement with opensketch","author":"yu","year":"0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544024"},{"year":"1999","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199557"},{"key":"ref5","article-title":"Relational dynamic bayesian networks with locally exchangeable measures","author":"choi","year":"2013","journal-title":"LBNL Technical Report LBNL-6341E"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"year":"0","key":"ref2"},{"year":"2015","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","article-title":"A new intrusion detection system using support vector machines and hierarchical clustering","volume":"16","author":"khan","year":"2007","journal-title":"The VLDB Journal"}],"event":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2017,1,26]]},"location":"Silicon Valley, CA, USA","end":{"date-parts":[[2017,1,29]]}},"container-title":["2017 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7871262\/7876087\/07876207.pdf?arnumber=7876207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T17:54:13Z","timestamp":1568915653000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7876207\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2017.7876207","relation":{},"subject":[],"published":{"date-parts":[[2017,1]]}}}