{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:22:40Z","timestamp":1729664560533,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266510","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T17:59:13Z","timestamp":1443117553000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Online detection of anomalous network flows with soft clustering"],"prefix":"10.1109","author":[{"given":"Mikhail","family":"Zolotukhin","sequence":"first","affiliation":[]},{"given":"Timo","family":"Hamalainen","sequence":"additional","affiliation":[]},{"given":"Tero","family":"Kokkonen","sequence":"additional","affiliation":[]},{"given":"Jarmo","family":"Siltanen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"WinterSim","article-title":"Inductive intrusion detection in flow-based network data using one-class support vector machines, msc thesis","year":"2010","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359576"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2013.6727841"},{"key":"ref13","first-page":"285","article-title":"A flow based anomaly detection system using chi-square technique","author":"muraleedharan","year":"2010","journal-title":"Proceedings of the 2nd IEEE International Advance Computing Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831160"},{"key":"ref15","first-page":"89","article-title":"An anomaly detection method based on fuzzy c-means clustering algorithm","author":"xie","year":"2010","journal-title":"Proceedings of the 2nd Int Symp on Networking and Network Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2007.372846"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2013.6466310"},{"article-title":"A gentle tutorial of the em algorithm and its application to parameter estimation for gaussian mixture and hidden markov models","year":"1997","author":"bilmes","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/41.8.578"},{"key":"ref4","first-page":"1","article-title":"Anomaly based intrusion detection using hybrid learning approach of combining k-medoids clustering and nave bayes classification","author":"chitrakar","year":"2012","journal-title":"Proceedings of the 8th Int Conf on Wireless Communications Networking and Mobile Computing"},{"journal-title":"Computer Security","year":"2006","author":"gollmann","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990529"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2012.51"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720582"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.40"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"year":"2008","key":"ref1","article-title":"Cert coordination center"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36608-6_18"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"229","DOI":"10.22436\/jmcs.05.03.11","article-title":"A survey of hierarchical clustering algorithms","volume":"5","author":"rafsanjani","year":"2012","journal-title":"Mathematics in Computer Science"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2014.79"},{"year":"0","key":"ref21","article-title":"Jyvsectec-rgce - homepage"},{"year":"2013","key":"ref23","article-title":"Ministry of defence press release 8.5.2013, kyberturvallisuusharjoitus jyvaskylassa 13.-17.5.2013"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266510.pdf?arnumber=7266510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T19:28:36Z","timestamp":1567193316000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266510","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}