{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:13:48Z","timestamp":1740100428645,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.1109\/icumt54235.2021.9631682","type":"proceedings-article","created":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T21:08:43Z","timestamp":1639429723000},"page":"115-121","source":"Crossref","is-referenced-by-count":2,"title":["Research of wireless network traffic analysis using big data processing technology"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6369-1238","authenticated-orcid":false,"given":"Kovtsur","family":"Maxim","sequence":"first","affiliation":[{"name":"The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,St. Petersburg,Russia"}]},{"given":"Kistruga","family":"Anton","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,St. Petersburg,Russia"}]},{"given":"Mikhailova","family":"Anastasiya","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,St. Petersburg,Russia"}]},{"given":"Potemkin","family":"Pavel","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,St. Petersburg,Russia"}]},{"given":"Volkogonov","family":"Vladimir","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,St. Petersburg,Russia"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2016.7786995"},{"key":"ref11","first-page":"87","article-title":"Investigation of authentication failure and arp injection attacks and methods of their detection in IEEE 802.11 family networks","volume":"9","author":"kovtsur","year":"2021","journal-title":"Journal of Telecommunications and Information Technolog"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT51630.2020.9222427"},{"key":"ref13","first-page":"102","article-title":"Key distribution in wireless networks with mobile objects based on the use of MIMO channels with signal phase quantization","author":"yakovlev","year":"2016","journal-title":"Problems of Information Security Computer Systems"},{"key":"ref14","first-page":"734","article-title":"Heidt Michael","author":"gruzdev","year":"2019","journal-title":"Studying pandas"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT51630.2020.9222409"},{"key":"ref16","first-page":"46","article-title":"Improvement of probabilistic-temporal characteristics of 802.11 encapsulation protocols","volume":"2","author":"yurkin","year":"2016","journal-title":"Questions of cybersecurity"},{"journal-title":"CWDP-303 Certified Wireless Design Professional (Black & White) Official Study Guide","year":"2018","author":"carpenter","key":"ref17"},{"key":"ref18","first-page":"576 c","author":"henry","year":"2020","journal-title":"CCNP Enterprise Wireless Design ENWLSD 300&#x2013;425 and Implementation ENWLSI 300&#x2013;430 Official Cert Guide"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30859-9_40"},{"key":"ref4","first-page":"287","article-title":"Guidelines for Using Machine Learning Technology to Ensure Information Security","author":"kovtsur","year":"0","journal-title":"International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT51630.2020.9222245"},{"key":"ref6","first-page":"39","article-title":"Methodology for visualizing Big data in information security systems for generating vulnerability reports","author":"krasov","year":"2019","journal-title":"Elektrosvyaz"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RUSAUTOCON.2019.8867699"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.01.016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT51630.2020.9222444"},{"key":"ref2","first-page":"119","article-title":"Elena Simona Lohan. Applying Machine Learning to LTE Traffic Prediction: Comparison of Bagging, Random Forest, and SVM","author":"stepanov","year":"0","journal-title":"International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"},{"journal-title":"Cisco predicts an increase in data transfer speed the number of Internet users and the number of devices connected to the network in Russia","year":"0","key":"ref1"},{"key":"ref9","article-title":"Practical Results of WLAN Traffic Analysis","volume":"10531","author":"paramonov","year":"0","journal-title":"Internet of Things Smart Spaces and Next Generation Networks and Systems ruSMART 2017 NsCC 2017 NEW2AN 2017"}],"event":{"name":"2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2021,10,25]]},"location":"Brno, Czech Republic","end":{"date-parts":[[2021,10,27]]}},"container-title":["2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631553\/9631559\/09631682.pdf?arnumber=9631682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T22:57:55Z","timestamp":1659481075000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icumt54235.2021.9631682","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}