{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:01Z","timestamp":1772163961857,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,30]],"date-time":"2004-08-30T00:00:00Z","timestamp":1093824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,30]]},"DOI":"10.1145\/1015467.1015492","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"219-230","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":503,"title":["Diagnosing network-wide traffic anomalies"],"prefix":"10.1145","author":[{"given":"Anukool","family":"Lakhina","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Mark","family":"Crovella","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"Christophe","family":"Diot","sequence":"additional","affiliation":[{"name":"Intel Research, Cambridge, UK"}]}],"member":"320","published-online":{"date-parts":[[2004,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Fourteenth Systems Administration Conference (LISA)","author":"Brutlag J.","year":"2000","unstructured":"J. Brutlag . Aberrant behavior detection in time series for network monitoring . In USENIX Fourteenth Systems Administration Conference (LISA) , 2000 . J. Brutlag. Aberrant behavior detection in time series for network monitoring. In USENIX Fourteenth Systems Administration Conference (LISA), 2000."},{"key":"e_1_3_2_1_3_1","unstructured":"NetFlow. At www.cisco.com\/warp\/public\/732\/Tech\/netflow\/.  NetFlow. At www.cisco.com\/warp\/public\/732\/Tech\/netflow\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Flesia and N. El-Karoui and M. Elad. Inferring Sparse Causes for Extreme Network Events. In Network Modeling and Simulation Workshop at Dartmouth College","author":"Donoho D.","year":"2002","unstructured":"D. Donoho and G. Flesia and N. El-Karoui and M. Elad. Inferring Sparse Causes for Extreme Network Events. In Network Modeling and Simulation Workshop at Dartmouth College , 2002 . D. Donoho and G. Flesia and N. El-Karoui and M. Elad. Inferring Sparse Causes for Extreme Network Events. In Network Modeling and Simulation Workshop at Dartmouth College, 2002."},{"key":"e_1_3_2_1_5_1","volume-title":"American Control Conference","author":"Dunia R.","year":"1997","unstructured":"R. Dunia and S. J. Qin . Multi-dimensional Fault Diagnosis Using a Subspace Approach . In American Control Conference , 1997 . R. Dunia and S. J. Qin. Multi-dimensional Fault Diagnosis Using a Subspace Approach. In American Control Conference, 1997."},{"key":"e_1_3_2_1_6_1","author":"Dunia R.","year":"1998","unstructured":"R. Dunia and S. J. Qin . A subspace approach to multidimensional fault identification and reconstruction. American Institute of Chemical Engineers (AIChE) Journal, pages 1813--1831 , 1998 . R. Dunia and S. J. Qin. A subspace approach to multidimensional fault identification and reconstruction. American Institute of Chemical Engineers (AIChE) Journal, pages 1813--1831, 1998.","journal-title":"American Institute of Chemical Engineers (AIChE) Journal, pages 1813--1831"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166264"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.929850"},{"key":"e_1_3_2_1_9_1","volume-title":"Matrix Computations","author":"Golub G.","unstructured":"G. Golub and C. F. V. Loan . Matrix Computations . The Johns Hopkins University Press . G. Golub and C. F. V. Loan. Matrix Computations. The Johns Hopkins University Press."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/839292.843008"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1979.10489779"},{"key":"e_1_3_2_1_12_1","author":"Jensen D. R.","year":"1972","unstructured":"D. R. Jensen and H. Solomon . A Gaussian Approximation to the Distribution of a Definite Quadratic Form. J. of the American Statistical Association, pages 898--902 , 1972 . D. R. Jensen and H. Solomon. A Gaussian Approximation to the Distribution of a Definite Quadratic Form. J. of the American Statistical Association, pages 898--902, 1972.","journal-title":"J. of the American Statistical Association, pages 898--902"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.477721"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005697"},{"key":"e_1_3_2_1_17_1","volume-title":"ICC","author":"Lazar A. A.","year":"1992","unstructured":"A. A. Lazar , W. Wang , and R. Deng . Models and algorithms for network fault detection and identification: A review . In ICC , 1992 . A. A. Lazar, W. Wang, and R. Deng. Models and algorithms for network fault detection and identification: A review. In ICC, 1992."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633041"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0098-1354(02)00093-5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/0613061"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005745"},{"key":"e_1_3_2_1_22_1","unstructured":"Juniper Traffic Sampling. At www.juniper.net\/techpubs\/software\/junos\/junos60\/swconfig60-policy\/html\/sampling-overview.html.  Juniper Traffic Sampling. At www.juniper.net\/techpubs\/software\/junos\/junos60\/swconfig60-policy\/html\/sampling-overview.html."},{"key":"e_1_3_2_1_23_1","first-page":"365","volume-title":"Estimating Source-Destination Traffic Intensities from Link Data. J. of the American Statistical Association","author":"Vardi Y.","year":"1996","unstructured":"Y. Vardi . Network Tomography : Estimating Source-Destination Traffic Intensities from Link Data. J. of the American Statistical Association , pages 365 -- 377 , 1996 . Y. Vardi. Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data. J. of the American Statistical Association, pages 365--377, 1996."},{"key":"e_1_3_2_1_24_1","volume-title":"Workshop on Information Assurance and Security","author":"Ye N.","year":"2000","unstructured":"N. Ye . A Markov Chain Model of Temporal Behavior for Anomaly Detection . In Workshop on Information Assurance and Security , 2000 . N. Ye. A Markov Chain Model of Temporal Behavior for Anomaly Detection. In Workshop on Information Assurance and Security, 2000."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863990"}],"event":{"name":"SIGCOMM04: ACM SIGCOMM 2004 Conference","location":"Portland Oregon USA","acronym":"SIGCOMM04","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1015467.1015492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:23:45Z","timestamp":1750253025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,30]]},"references-count":24,"alternative-id":["10.1145\/1015467.1015492","10.1145\/1015467"],"URL":"https:\/\/doi.org\/10.1145\/1015467.1015492","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1030194.1015492","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,8,30]]},"assertion":[{"value":"2004-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}