{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:34:27Z","timestamp":1725744867945},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/iwcmc.2011.5982725","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T13:59:27Z","timestamp":1315835967000},"page":"1287-1291","source":"Crossref","is-referenced-by-count":7,"title":["Hierarchical clustering and visualization of aggregate cyber data"],"prefix":"10.1109","author":[{"given":"Robert M.","family":"Patton","sequence":"first","affiliation":[]},{"given":"Justin M.","family":"Beaver","sequence":"additional","affiliation":[]},{"given":"Chad A.","family":"Steed","sequence":"additional","affiliation":[]},{"given":"Thomas E.","family":"Potok","sequence":"additional","affiliation":[]},{"given":"Jim N.","family":"Treadwell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2011","key":"ref10"},{"year":"2011","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1145\/1054972.1055031","article-title":"prefuse: A toolkit for interactive information visualization","author":"heer","year":"2005","journal-title":"Proc of the SIGCHI conference on Human factors in computing systems"},{"key":"ref13","first-page":"9","article-title":"Information slices: visualizing and exploring large hierarchies using cascading, semi-circular discs","author":"andrews","year":"1998","journal-title":"Proc of IEEE Symposium on Information Visualization Late Breaking Hot Topic"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2000.885091"},{"key":"ref15","first-page":"77","article-title":"InterRing: An interactive tool for visually navigating and manipulating hierarchical structures","author":"yang","year":"2002","journal-title":"Proc of the IEEE Symposium on Information Visualization"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2009.01439.x"},{"article-title":"Applicability of clustering to cyber intrusion detection","year":"2007","author":"hendry","key":"ref4"},{"year":"2011","key":"ref3"},{"key":"ref6","article-title":"Intrusion detection with unlabeled data using clustering","author":"portnoy","year":"2001","journal-title":"Proceedings of ACM CSS Workshop on Data Mining Applied to Security"},{"journal-title":"1999 DARPA Intrusion Detection Evaluation Data Sets","year":"1999","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/2282912"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"year":"2011","key":"ref2"},{"year":"2011","key":"ref1"},{"journal-title":"Data Mining -Concepts and Techniques","year":"2001","author":"han","key":"ref9"}],"event":{"name":"2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011)","start":{"date-parts":[[2011,7,4]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2011,7,8]]}},"container-title":["2011 7th International Wireless Communications and Mobile Computing Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5963770\/5982406\/05982725.pdf?arnumber=5982725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,4]],"date-time":"2021-12-04T07:49:01Z","timestamp":1638604141000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5982725\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2011.5982725","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}