{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T05:03:56Z","timestamp":1725426236254},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417544","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T19:11:24Z","timestamp":1459192284000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["FlowBox: Anomaly Detection Using Flow Analysis in Cloud Applications"],"prefix":"10.1109","author":[{"given":"Senbo","family":"Fu","sequence":"first","affiliation":[]},{"given":"Hyong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Prior","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691701"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23541-2_14"},{"key":"ref12","first-page":"75","article-title":"Computer Intrusion Detection through EWMA for autocorrelated and uncorrelated data","author":"ye","year":"2003","journal-title":"IEEE Transactions on Reliability"},{"key":"ref13","first-page":"321","article-title":"BotGraph: Large Scale Spamming Botnet Detection","author":"zhao","year":"2009","journal-title":"Networked Systems Design and Implementation (NSDI)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SSP.2012.6319708"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.335"},{"journal-title":"Hadoop MapReduce API","year":"0","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853411"},{"year":"0","key":"ref3","article-title":"Amazon.com Goes Down, Loses $66,240 Per Minute"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.65"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/DSN.2002.1029005","article-title":"Pin-point: problem determination in large, dynamic Internet services","author":"chen","year":"2002","journal-title":"IEEE Int Conf Dependable Systems and Networks (DSN)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630116"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.26"},{"year":"0","key":"ref2","article-title":"Data Center Outages Generate Big Losses"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PICMET.2007.4349326"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2013.51"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:24:12Z","timestamp":1602685452000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417544","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}