{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:26:02Z","timestamp":1725686762638},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/infocom.2018.8485858","type":"proceedings-article","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:45:36Z","timestamp":1539873936000},"page":"2051-2059","source":"Crossref","is-referenced-by-count":5,"title":["Mining Long-Term Stealthy User Behaviors on High Speed Links"],"prefix":"10.1109","author":[{"given":"Pinghui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Virtual index methods Public data set","year":"0","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1145\/3050220.3063772","article-title":"Heavy-hitter detection entirely in the data plane","author":"sivaraman","year":"2017","journal-title":"SOSR"},{"key":"ref31","article-title":"Flowradar: A better netflow for data centers","author":"li","year":"2016","journal-title":"USENIX NSDI"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787503"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"1998","author":"stallings","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483446"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14778\/3025111.3025112"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330117"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2503269"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061990"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2123094"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935169"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934948"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773182"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.896150"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863992"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948235"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2312544"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2746403"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061991"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT-W.2007.14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863972"},{"key":"ref29","article-title":"Software defined traffic measurement with opensketch","author":"yu","year":"2013","journal-title":"USENIX NSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633056"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007588"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50048-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.33"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028802"},{"key":"ref1","article-title":"Exploiting temporal persistence to detect covert botnet channels","author":"giroire","year":"2009","journal-title":"RAID"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.207"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452553"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1145\/1012888.1005709","article-title":"Data streaming algorithms for efficient and accurate estimation of flow size distribution","author":"kumar","year":"2004","journal-title":"ACM SIGMETRICS"},{"key":"ref24","article-title":"Sketch guided sampling-using onling estimates of flow size for adaptive data collection","author":"kumar","year":"2006","journal-title":"IEEE INFOCOM"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3143314.3078593"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064221"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298345"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1145\/1140103.1140295","article-title":"Data streaming algorithms for estimating entropy of network traffic","author":"lall","year":"2006","journal-title":"ACM SIGMET-RICS"}],"event":{"name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications","start":{"date-parts":[[2018,4,16]]},"location":"Honolulu, HI","end":{"date-parts":[[2018,4,19]]}},"container-title":["IEEE INFOCOM 2018 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8464035\/8485803\/08485858.pdf?arnumber=8485858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:24:15Z","timestamp":1598228655000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8485858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/infocom.2018.8485858","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}