{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:44:24Z","timestamp":1776077064008,"version":"3.50.1"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,24]]},"DOI":"10.1109\/nca51143.2020.9306732","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T23:22:37Z","timestamp":1609888957000},"page":"1-10","source":"Crossref","is-referenced-by-count":12,"title":["Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS"],"prefix":"10.1109","author":[{"given":"Luis","family":"Dias","sequence":"first","affiliation":[]},{"given":"Simao","family":"Valente","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"KDD-96 Proceedings"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.09.004"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7_14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347176"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1002\/widm.53"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1348\/000711005X48266"},{"key":"ref34","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref27","year":"0","journal-title":"MITRE ATT &CK brute force"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-015-0013-4"},{"key":"ref2","author":"fireye","year":"2020","journal-title":"Special report M-TRENDS 2020"},{"key":"ref1","article-title":"Check Point Research","year":"2020","journal-title":"Check point 2020 cyber security report"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/cyto.a.23030"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0179180"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281630"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7011"},{"key":"ref26","year":"0","journal-title":"MITRE ATT&CK network service scanning"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.018"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/31\/1\/012012"},{"key":"ref51","article-title":"Python 3 Reference Manual","author":"van rossum","year":"2009","journal-title":"CreateS-pace"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-9611-0.ch014"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2007.55"},{"key":"ref52","first-page":"51","article-title":"Data structures for statistical computing in Python","author":"mckinney","year":"2010","journal-title":"Proceedings of the 9th Python in Science Conference"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_8"},{"key":"ref11","article-title":"Big data analytics for detecting host misbehavior in large logs","author":"gon\u00e7alves","year":"2015","journal-title":"Proceedings of the 14th IEEE International Conference on Trust Security and Privacy in Computing and Communications"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.023"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00086"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36938-5_12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6335"},{"key":"ref16","year":"0","journal-title":"Service Name and Transport Protocol Port Number Registry"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1515\/9781400874668"},{"key":"ref18","first-page":"758","article-title":"The curse of dimensionality in data mining and time series prediction","author":"sen","year":"2005","journal-title":"International Work-Conference on Artificial Neural Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1126\/scisignal.aad1932"},{"key":"ref4","first-page":"139","article-title":"Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection","author":"gu","year":"2008","journal-title":"17th USENIX Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345484"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1947940.1948050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.016"},{"key":"ref7","author":"yen","year":"2011","journal-title":"Detecting stealthy malware using behavioral features in network traffic"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1243\/095440605X8298"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"ref46","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref45","year":"0","journal-title":"hdbscan clustering library Benchmarking performance and scaling of python clustering algorithms"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.38"},{"key":"ref47","year":"0","journal-title":"MITRE ATT&CK uncommonly used port"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737792"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-015-0040-1"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"}],"event":{"name":"2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)","location":"Cambridge, MA, USA","start":{"date-parts":[[2020,11,24]]},"end":{"date-parts":[[2020,11,27]]}},"container-title":["2020 IEEE 19th International Symposium on Network Computing and Applications (NCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9306506\/9306688\/09306732.pdf?arnumber=9306732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:29Z","timestamp":1656453089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9306732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,24]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/nca51143.2020.9306732","relation":{},"subject":[],"published":{"date-parts":[[2020,11,24]]}}}