{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:18:10Z","timestamp":1730272690227,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6755025","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000670-000675","source":"Crossref","is-referenced-by-count":2,"title":["On the comprehension of DSL SyncTrap events in IPTV networks"],"prefix":"10.1109","author":[{"given":"Angelos K.","family":"Marnerides","sequence":"first","affiliation":[]},{"given":"Simon","family":"Malinowski","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Morla","sequence":"additional","affiliation":[]},{"given":"Miguel R. D.","family":"Rodriguesz","sequence":"additional","affiliation":[]},{"given":"Hyong S.","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Semi-supervised learning literature survey","year":"2006","author":"zhu","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"14","article-title":"SVMs modeling for highly imbalanced classification","author":"tang","year":"2009","journal-title":"IEEE Trans Sys Man Cyber Part B"},{"key":"11","volume":"35","author":"lakhina","year":"2005","journal-title":"Mining Anomalies Using Traffic Feature Distributions ACM SIGCOMM CCR"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"3","article-title":"Towards the improvement of diagnostic metrics fault diagnosis of DSL-Based IPTV networks using the renyi entropy","author":"marnerides","year":"2012","journal-title":"IEEE GLOBECOM"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079309"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592596"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/BF01025868"},{"key":"9","article-title":"Theoretical foundations of the potential fitnction method in pattern recognition learning","author":"aizerman","year":"1964","journal-title":"Automation and Remote Control"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.231"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06755025.pdf?arnumber=6755025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:26:24Z","timestamp":1490289984000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6755025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6755025","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}