{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:57:28Z","timestamp":1725631048338},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746810","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T15:29:46Z","timestamp":1232119786000},"page":"216-220","source":"Crossref","is-referenced-by-count":6,"title":["Anomaly detection and visualization using Fisher Discriminant clustering of network entropy"],"prefix":"10.1109","author":[{"given":"Mehmet","family":"Celenk","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Conley","sequence":"additional","affiliation":[]},{"given":"John","family":"Willis","sequence":"additional","affiliation":[]},{"given":"James","family":"Graham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/WETICE.2005.35"},{"year":"2004","author":"stallings","journal-title":"Data and Computer Communications","key":"13"},{"year":"2006","author":"theodoridis","journal-title":"Pattern Recognition","key":"14"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1145\/1080091.1080118","article-title":"mining anomalies using traffic distributions","author":"lakhina","year":"2005"},{"year":"2005","author":"lall","article-title":"data streaming algorithms for estimating entropy of network traffic","key":"12"},{"year":"2005","author":"eimann","article-title":"network event detection with t-entropy","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/ICSMC.2008.4811848"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1103\/PhysRevE.64.026110"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TDSC.2010.46"},{"key":"5","first-page":"340","article-title":"on effectiveness of link padding for statistical traffic analysis attacks","author":"fu","year":"2003","journal-title":"ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/MCG.2006.49"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.patcog.2006.12.010"},{"key":"8","article-title":"measuring network change: renyi cross entropy and the secod order degree distribution","author":"harrington","year":"2006","journal-title":"Passive and Active Measurement (PAM) Conference"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746810.pdf?arnumber=4746810","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T15:50:58Z","timestamp":1497801058000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4746810\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746810","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}