{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:10:48Z","timestamp":1758845448737,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61103108","61402540","61103096"],"award-info":[{"award-number":["61103108","61402540","61103096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science & Technology Pillar Program of China","award":["2012BAH08B01"],"award-info":[{"award-number":["2012BAH08B01"]}]},{"name":"Hunan Provincial Science and Technology Program","award":["2012RS4049"],"award-info":[{"award-number":["2012RS4049"]}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["12JJ3062"],"award-info":[{"award-number":["12JJ3062"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/jsyst.2014.2358997","type":"journal-article","created":{"date-parts":[[2015,5,7]],"date-time":"2015-05-07T18:40:05Z","timestamp":1431024005000},"page":"1350-1360","source":"Crossref","is-referenced-by-count":11,"title":["A Matrix-Based Visualization System for Network Traffic Forensics"],"prefix":"10.1109","volume":"10","author":[{"given":"Ronghua","family":"Shi","sequence":"first","affiliation":[]},{"given":"Mengjie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fangfang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-013-4891-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24712-5_18"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379695"},{"journal-title":"Netintercept","year":"0","key":"ref10"},{"journal-title":"Netdetector","year":"0","key":"ref11"},{"journal-title":"tcpdump","year":"2001","author":"mccanne","key":"ref12"},{"journal-title":"SNORT","year":"0","key":"ref13"},{"journal-title":"Readings in Information Visualization Using Vision To Think","year":"1999","author":"card","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2011.17"},{"key":"ref16","first-page":"1008","article-title":"Intelligent network management using graph differential anomaly visualization","author":"liao","year":"0","journal-title":"Proc IEEE NOMS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379699"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.12.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70522"},{"journal-title":"VAST Challenge 2013","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2005.67"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-6215-6_30"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532060"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2005.35"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s12650-014-0213-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1047124.1047403"},{"journal-title":"Computer Forensics Incident Response Essentials","year":"2001","author":"heiser","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029220"},{"journal-title":"Network Forensics Tapping the Internet","year":"0","author":"garfinkel","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.02.003"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/1473871613488572"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379700"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654828"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/1473871613490291"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2517957.2517961"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029217"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/7752999\/07103277.pdf?arnumber=7103277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:30Z","timestamp":1642004910000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7103277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2014.2358997","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}