{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:21:54Z","timestamp":1762917714426},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/sera.2016.7516125","type":"proceedings-article","created":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T20:51:43Z","timestamp":1469134303000},"page":"31-37","source":"Crossref","is-referenced-by-count":10,"title":["A streaming-based network monitoring and threat detection system"],"prefix":"10.1109","author":[{"given":"Zhijiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hanlin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"William G.","family":"Hatcher","sequence":"additional","affiliation":[]},{"given":"James","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2014.925110"},{"key":"ref11","article-title":"Global intrusion detection in the domino overlay system","author":"yegneswaran","year":"2004","journal-title":"Proceedings of the 11th IEEE Network and Distributed System Security Symposium (NDSS)"},{"key":"ref12","article-title":"A threat monitoring system in enterprise networks with mobile devices","author":"yu","year":"2013","journal-title":"Proceedings of ACM International Conference on Reliable and Convergent Systems (RACS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682765"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.88"},{"key":"ref15","article-title":"Understanding big data: Analytics for enterprise class hadoop and streaming data","author":"zikopoulos","year":"2011","journal-title":"Book"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.03.014"},{"journal-title":"CAIDA DATA","year":"2015","key":"ref3"},{"key":"ref6","article-title":"Efficient evaluation of xquery over streaming data","author":"li","year":"2005","journal-title":"Proceedings of the 31st International Conference on Very Large Data Bases (VLDB)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497449"},{"journal-title":"LOIC (Low Orbit Ion Cannon)","year":"2015","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(84)90020-7"},{"key":"ref1","article-title":"The internet motion sensor: A distributed blackhole monitoring system","author":"bailey","year":"2005","journal-title":"Proceedings of Network and Distributed System Security Symposium (NDSS)"},{"journal-title":"SLPARK","year":"2015","key":"ref9"}],"event":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","start":{"date-parts":[[2016,6,8]]},"location":"Towson, MD, USA","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7510533\/7516114\/07516125.pdf?arnumber=7516125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T23:58:00Z","timestamp":1475020680000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7516125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/sera.2016.7516125","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}