{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:50:49Z","timestamp":1729630249355,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/ngi.2009.5175758","type":"proceedings-article","created":{"date-parts":[[2009,8,5]],"date-time":"2009-08-05T13:55:24Z","timestamp":1249480524000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Discriminating Internet Applications based on Multiscale Analysis"],"prefix":"10.1109","author":[{"given":"Eduardo","family":"Rocha","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Salvador","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Nogueira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"2002","article-title":"wades: a tool for distributed denial of service attack detection","author":"ramanathan","year":"2002","journal-title":"Master's Thesistamu-Ece"},{"key":"17","first-page":"71","article-title":"a signal analysis of network traffic anomalies","author":"kline","year":"2002","journal-title":"IMW 02 Proc of the 2nd ACM SIGCOMM Workshop on Internet Measurment"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1049\/ip-com:20010659"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/90.282603"},{"year":"2008","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1002\/047120644X.ch2"},{"key":"14","article-title":"wavelet-based multifractal analysis of real and simulated time-series of earthquakes","volume":"47","author":"enescu","year":"2004","journal-title":"Annuals of Disaster Prevention Research Institute Annuals"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1028788.1028804"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/LCN.2005.35"},{"key":"21","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/285237.285256","article-title":"data networks as cascades: investigating the multifractal nature of internet wan traffic","author":"feldmann","year":"1998","journal-title":"SIGCOMM '98 Proceedings Of The Acm Sigcomm '98 Conference On Applications Technologies Architectures And Protocols For Computer Communication"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1145\/316188.316235"},{"key":"22","article-title":"infinitely divisible cascade analysis of network traffic data","author":"veitch","year":"2000","journal-title":"Proceedings of the International Conference on Acoustics Speech and Signal Processing"},{"year":"1990","author":"kaufman","journal-title":"Finding Groups in Data An Introduction to Cluster Analysis","key":"23"},{"key":"24","first-page":"281","article-title":"some methods for classification and analysis of multivariate observations","author":"macqueen","year":"1967","journal-title":"Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability"},{"year":"2009","journal-title":"March Tcpdump\/libpcap Public Repository","key":"25"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1109\/ICASSP.1988.197121"},{"year":"2009","key":"27"},{"key":"28","article-title":"module for identifying internet applications and its integration in a peer-topeer measurement tool","author":"rocha","year":"2007","journal-title":"Proceedings of the IADIS International Conference"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/1162678.1162679"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/NGI.2005.1431686"},{"key":"10","first-page":"219","article-title":"application identification based on network behavioral profiles","author":"hu","year":"2008","journal-title":"Quality of Service 2008 IWQoS 2008 16th International Workshop"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24668-8_21","article-title":"flow clustering using machine learning techniques","author":"mcgregor","year":"2004","journal-title":"Proceedings of the Passive and Active Measurement Workshop (PAM2004)"},{"key":"7","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.1109\/GLOCOM.2004.1378239","article-title":"is p2p dying or just hiding? p2p traffic measurement","volume":"3","author":"karagiannis","year":"2004","journal-title":"Global Telecommunications Conference 2004"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/988672.988742"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/MASCOTS.2006.6"},{"key":"4","article-title":"multifractal properties of tcp traffic: a numerical study","author":"riedi","year":"1997","journal-title":"Tech Rep"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1080091.1080119"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1145\/1080173.1080183"}],"event":{"name":"2009 Next Generation Internet Networks (NGI)","start":{"date-parts":[[2009,7,1]]},"location":"Aviero, Portugal","end":{"date-parts":[[2009,7,3]]}},"container-title":["2009 Next Generation Internet Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5175743\/5175744\/05175758.pdf?arnumber=5175758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T18:34:23Z","timestamp":1497810863000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5175758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ngi.2009.5175758","relation":{},"subject":[],"published":{"date-parts":[[2009,7]]}}}