{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T12:24:41Z","timestamp":1743596681749,"version":"3.37.3"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T00:00:00Z","timestamp":1607904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000005","name":"U.S. Dept. of Navy","doi-asserted-by":"publisher","award":["N00014-17-1-3062"],"award-info":[{"award-number":["N00014-17-1-3062"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,14]]},"DOI":"10.1109\/snams52053.2020.9336569","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T23:20:56Z","timestamp":1612394456000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Data Driven Network Monitoring and Intrusion Detection using Machine Learning"],"prefix":"10.1109","author":[{"given":"Brandon","family":"Williams","sequence":"first","affiliation":[{"name":"Center of Excellence in Research and Education for Big Military Data Intelligence (CREDIT), Prairie View A&M University, Texas A&M University System,Prairie View,Texas,USA,77446"}]},{"given":"Xishuang","family":"Dong","sequence":"additional","affiliation":[{"name":"Center of Excellence in Research and Education for Big Military Data Intelligence (CREDIT), Prairie View A&M University, Texas A&M University System,Prairie View,Texas,USA,77446"}]},{"given":"Lijun","family":"Qian","sequence":"additional","affiliation":[{"name":"Center of Excellence in Research and Education for Big Military Data Intelligence (CREDIT), Prairie View A&M University, Texas A&M University System,Prairie View,Texas,USA,77446"}]}],"member":"263","reference":[{"journal-title":"System and network security - analysis and visualization of the network traffic","year":"2009","author":"bertuletti","key":"ref10"},{"key":"ref11","first-page":"129","author":"lee","year":"2005","journal-title":"Visual firewall Real-time network security monitor"},{"journal-title":"The ant lab Analysis of network traffic","year":"0","key":"ref12"},{"journal-title":"The CTU-13 dataset a labeled dataset with botnet normal and background traffic","year":"0","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.127"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.05.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FADS.2017.8253208"},{"journal-title":"A better way to visualize what's on our networks?","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738566"},{"journal-title":"U S data breaches and exposed records 2019","year":"0","key":"ref1"},{"key":"ref9","first-page":"185","author":"kim","year":"2005","journal-title":"Netviewer A network traffic visualization and analysis tool"}],"event":{"name":"2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2020,12,14]]},"location":"Paris, France","end":{"date-parts":[[2020,12,16]]}},"container-title":["2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9336519\/9336528\/09336569.pdf?arnumber=9336569","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:14:27Z","timestamp":1656602067000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9336569\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,14]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/snams52053.2020.9336569","relation":{},"subject":[],"published":{"date-parts":[[2020,12,14]]}}}