{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:09:10Z","timestamp":1749787750593,"version":"3.41.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/isi.2016.7745449","type":"proceedings-article","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T21:35:34Z","timestamp":1479418534000},"page":"91-96","source":"Crossref","is-referenced-by-count":4,"title":["Model-based clustering and new edge modelling in large computer networks"],"prefix":"10.1109","author":[{"given":"Silvia","family":"Metelli","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Heard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1111\/j.2517-6161.1972.tb00899.x","article-title":"Regression models and life-tables (with discussion)","volume":"34","author":"cox","year":"1972","journal-title":"J R Statist Soc B"},{"year":"2014","author":"heard","article-title":"Modelling new edge formation in a computer network through bayesian variable selection","key":"ref3"},{"key":"ref10","article-title":"User-computer authentication associations in time","author":"kent","year":"2014","journal-title":"Los Alamos National Laboratory"},{"year":"1973","author":"duda","journal-title":"Pattern Classification and Scene Analysis","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1093\/biomet\/93.4.877"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1162\/neco.1992.4.3.415"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.2307\/2532201"},{"key":"ref2","first-page":"447","article-title":"Detecting fraud in the real world","volume":"45","author":"cahill","year":"2004","journal-title":"Computing Reviews"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1093\/biomet\/57.1.97"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.comnet.2007.02.001"}],"event":{"name":"2016 IEEE Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2016,9,28]]},"location":"Tucson, AZ, USA","end":{"date-parts":[[2016,9,30]]}},"container-title":["2016 IEEE Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7739307\/7745427\/07745449.pdf?arnumber=7745449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T18:30:32Z","timestamp":1749753032000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7745449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/isi.2016.7745449","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}