{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:53:41Z","timestamp":1729677221056,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423689","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:27:47Z","timestamp":1360340867000},"page":"76-84","source":"Crossref","is-referenced-by-count":3,"title":["Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection"],"prefix":"10.1109","author":[{"given":"Cyriac","family":"James","sequence":"first","affiliation":[]},{"given":"Hema A.","family":"Murthy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348109"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20041087(410) 151"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498361"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-048-6_11"},{"journal-title":"Principles of Linear Systems and Signals","year":"2009","author":"lathi","key":"18"},{"key":"33","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73291-4","author":"kirchgassner","year":"2007","journal-title":"Introduction to Modern Time Series Analysis"},{"key":"15","first-page":"1013","article-title":"Evaluation of a low-rate dos attack against iterative servers","volume":"51","author":"papagiannaki","year":"2007","journal-title":"Journal of Computer and Telecommunications Networking"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.880180"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.2307\/1912773"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501975"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.805796"},{"key":"37","first-page":"67","article-title":"Some properties of absolute return: An alternative measure of risk","author":"granger","year":"1995","journal-title":"Ann Econ Statist"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2011.5985951"},{"journal-title":"Occasional Structural Breaks and Long Memory","year":"1999","author":"granger","key":"38"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378372"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CNMT.2009.5374676"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"43","first-page":"361","article-title":"The structural cause of file size distributions","author":"downey","year":"2001","journal-title":"MASCOT"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/68.1.165"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354569"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.1999.802014"},{"key":"45","doi-asserted-by":"crossref","DOI":"10.1117\/12.473390","article-title":"Large-scale measurement and modeling of backbone internet traffic","author":"roughan","year":"2002","journal-title":"SPIE ITCom"},{"key":"44","first-page":"1052","article-title":"Statistical analysis of network traffic inter-arrival","author":"bhattacharjee","year":"2010","journal-title":"ICACT"},{"year":"2012","key":"47"},{"year":"2012","key":"46"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"23","first-page":"229","article-title":"Snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th USENIX Conference on System Administration (LISA '99)"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060021"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.24"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254895"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810906"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52336"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115504"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853437"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582403"},{"key":"1","first-page":"379","article-title":"Experience in measuring internet backbone traffic variability: Models, metrics, measurements and meaning","author":"roughan","year":"2003","journal-title":"ITC"},{"journal-title":"Time Series Analysis Forecasting and Control","year":"1994","author":"box","key":"30"},{"key":"7","first-page":"421","article-title":"SYN-dog: Sniffing SYN flooding sources","author":"wang","year":"2002","journal-title":"ICDCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.2307\/1391755"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2011.6115171"},{"key":"31","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316566","author":"pankratz","year":"1983","journal-title":"Forecasting with Univariate Box-Jenkins Models Concepts and Cases"},{"key":"4","first-page":"200","article-title":"Traffic predictability based on ARIMA\/GARCH model","author":"zhou","year":"2006","journal-title":"NGI"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2006.302563"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF02831726"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423689.pdf?arnumber=6423689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T09:06:58Z","timestamp":1562663218000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423689","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}