{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:01:47Z","timestamp":1729627307868,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838304","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T19:03:46Z","timestamp":1406574226000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["I-CaN-MaMa: Integrated campus network monitoring and management"],"prefix":"10.1109","author":[{"given":"Shuai","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Kelsey","family":"Leftwich","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Owens","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Magrone","sequence":"additional","affiliation":[]},{"given":"James","family":"Schonemann","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Anderson","sequence":"additional","affiliation":[]},{"given":"Deep","family":"Medhi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Immersive network monitoring","author":"fisk","year":"2003","journal-title":"Proceedings of the 2003 Passive and Active Measurement Workshop"},{"year":"0","key":"22"},{"year":"0","key":"17"},{"key":"23","first-page":"589","article-title":"Viewing youtube from a metropolitan area: What do users accessing from residential isps experience?","author":"juluri","year":"2013","journal-title":"Proc of 13th IFIP\/IEEE IM'2013)"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2005.1523933"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532065"},{"key":"14","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1109\/ICNSC.2004.1297037","article-title":"Netflow based intrusion detection system","volume":"2","author":"pao","year":"2004","journal-title":"Networking Sensing and Control 2004 IEEE International Conference on"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815507"},{"key":"12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-36516-4_1","article-title":"Measurement artifacts in netflow data","author":"hofstede","year":"2013","journal-title":"Passive and Active Measurement"},{"year":"0","key":"21"},{"key":"3","first-page":"233","article-title":"Csamp: A system for network-wide flow monitoring","author":"sekar","year":"2008","journal-title":"NSDI"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2002.1045763"},{"year":"0","key":"2"},{"journal-title":"MRTG","year":"0","key":"1"},{"key":"10","first-page":"2","article-title":"Use of flow data for traffic analysis and network performance characterization","author":"bobyshev","year":"2007","journal-title":"CHEP07"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISDEA.2010.337"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2013.6465540"},{"key":"5","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-642-30633-4_18","article-title":"Towards bandwidth estimation using flow-level measurements","author":"schmidt","year":"2012","journal-title":"Dependable Networks and Services"},{"key":"4","article-title":"Monitoring an academic network with netflow","author":"lo?pez","year":"2004","journal-title":"Proceedings of EUNICE"},{"key":"9","article-title":"History-high speed network monitoring and analysis","author":"dressler","year":"2005","journal-title":"Proceedings of 24th IEEE Conference on Computer Communications (IEEE INFOCOM 2005)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1658997.1659010"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2014,5,5]]},"location":"Krakow, Poland","end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838304.pdf?arnumber=6838304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:26:09Z","timestamp":1498152369000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838304","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}