{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:04:04Z","timestamp":1725494644858},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423680","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:27:47Z","timestamp":1360340867000},"page":"59-67","source":"Crossref","is-referenced-by-count":1,"title":["Monitoring Traffic Activity Graphs with low-rank matrix approximation"],"prefix":"10.1109","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenji","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Guan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"233","article-title":"Csamp: A system for network-wide flow monitoring","author":"sekar","year":"2008","journal-title":"NSDI"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401973"},{"key":"17","first-page":"7","article-title":"Botgrep: Finding p2p bots with structured graph analysis","author":"nagaraja","year":"2010","journal-title":"Usenix Security"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592600"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536446"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2008.4472818"},{"journal-title":"Principal Component Analysis","year":"2002","author":"jolliffe","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298349"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555356"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"key":"12","article-title":"BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"Security '08"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1002\/sam.102"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1823844.1823846"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811063"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242692"},{"key":"7","first-page":"276","article-title":"Hit-list worm detection and bot identification in large networks using protocol graphs","author":"collins","year":"2007","journal-title":"RAID Berlin"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536445"},{"journal-title":"Wide-transit 150 Megabit Ethernet Trace 2008-03-18 (Collection)","year":"0","author":"cho","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1137\/080738970"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539704442702"},{"key":"8","first-page":"126","article-title":"Orthogonal nonnegative matrix t-factorizations for clustering","author":"ding","year":"2006","journal-title":"KDD"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423680.pdf?arnumber=6423680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:14:17Z","timestamp":1490127257000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423680","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}