{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:04:11Z","timestamp":1729645451595,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127488","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T16:34:31Z","timestamp":1330619671000},"page":"1333-1337","source":"Crossref","is-referenced-by-count":0,"title":["Graph-based analysis in network security"],"prefix":"10.1109","author":[{"given":"M. Patrick","family":"Collins","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Measurement Study of the BitTorrent Peer-to-peer File-sharing System","year":"2004","author":"pouwelse","key":"19"},{"key":"17","article-title":"Botgrep: Finding p2p bots with structured graph analysis","author":"nagaraja","year":"0","journal-title":"Proceedings of the 19th USENIX Conference on Security 2010"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1057\/9780230226203.1064"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-211-09442-6_13"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"13","article-title":"A social network analysis of aum shinrikyo: Understanding terrorism in australia","author":"koschade","year":"0","journal-title":"Proceedings of the 2005 Social Change in the 21st Century Conference 2005"},{"journal-title":"Towards a Theory of Scale-Free Graphs Definition Properties and Implications","year":"2005","author":"li","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.01.020"},{"journal-title":"Protographs Graph-based Approach to Netflow Analysis","year":"2010","author":"janies","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815503"},{"key":"20","article-title":"A measurement study of peer-to-peer file sharing systems","author":"saroiu","year":"0","journal-title":"Proceedings of Multimedia Computing and Networking 2002"},{"key":"22","article-title":"GrIDS - A graph-based intrusion detection system for large networks","author":"staniford-chen","year":"0","journal-title":"Proceedings of the 19th National Information Systems Security Conference 1996"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1064830.1064834"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1177\/0165551509353373"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1126\/science.1173299","article-title":"Scale-Free Networks: A Decade and Beyond","volume":"325","author":"barabasi","year":"2009","journal-title":"Science"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-06-01126-8"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335326"},{"journal-title":"NetFlow Services and Applications","year":"2002","key":"7"},{"key":"6","article-title":"Hit-list worm detection and bot identification in large networks using protocol graphs","author":"collins","year":"0","journal-title":"Proceedings of the 2007 Symposium on Recent Advances in Intrusion Detection 2007"},{"key":"5","article-title":"Structural properties of scale-free networks","author":"cohen","year":"2003","journal-title":"Handbook of Graphs and Networks"},{"key":"4","article-title":"L.: The giant component in a random subgraph of a given graph","author":"chung","year":"0","journal-title":"WAW 09 Proceedings of the 6th International Workshop on Algorithms and Models for the Web-Graph 2009"},{"key":"9","article-title":"Adolescent social networks: Friendship cliques, social isolates and drug use risk","author":"ennett","year":"2000","journal-title":"Improving Prevention Effectiveness"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920283"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127488.pdf?arnumber=6127488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:03:45Z","timestamp":1497971025000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127488","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}