{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:33Z","timestamp":1750308213622,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029208.1029215","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"35-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP"],"prefix":"10.1145","author":[{"given":"Soon Tee","family":"Teoh","sequence":"first","affiliation":[{"name":"University of California, Davis"}]},{"given":"Ke","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]},{"given":"Shih-Ming","family":"Tseng","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]},{"given":"Kwan-Liu","family":"Ma","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]},{"given":"S. Felix","family":"Wu","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191775"},{"key":"e_1_3_2_1_2_1","unstructured":"The RIPE Routing Information Services. http:\/\/www.ris.ripe.net.]]  The RIPE Routing Information Services. http:\/\/www.ris.ripe.net.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"The Route Views Project. http:\/\/www.antc.uoregon.edu\/route-views\/.]]  The Route Views Project. http:\/\/www.antc.uoregon.edu\/route-views\/.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263151"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the IEEE INFOCOM","author":"Labovitz C.","year":"1999","unstructured":"C. Labovitz , F. Jahanian , and G.R. Manlan . Origin of Internet Routing Stability . In Proceedings of the IEEE INFOCOM , June 1999 .]] C. Labovitz, F. Jahanian, and G.R.Manlan. Origin of Internet Routing Stability. In Proceedings of the IEEE INFOCOM, June 1999.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347428"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633048"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645532.656173"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637232"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633029"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/38.974517"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC'03)","author":"Yurcik W.","year":"2003","unstructured":"W. Yurcik , K. Lakkaraju , J. Barlow , and J. Rosendale . A prototype tool for visual data mining of network traffic for intrusion detection . In Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC'03) , 2003 .]] W. Yurcik, K. Lakkaraju, J. Barlow, and J. Rosendale. A prototype tool for visual data mining of network traffic for intrusion detection. In Proceedings of the ICDM Workshop on Data Mining for Computer Security (DMSEC'03), 2003.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647593.728890"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the IEEE Symposium on Information Visualization","author":"Muniandy K.","year":"2000","unstructured":"K. Muniandy . Case study : Visualizing time related events for intrusion detection . In Proceedings of the IEEE Symposium on Information Visualization , 2000 .]] K. Muniandy. Case study: Visualizing time related events for intrusion detection. In Proceedings of the IEEE Symposium on Information Visualization, 2000.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2002.1028831"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347124"},{"key":"e_1_3_2_1_18_1","first-page":"505","volume-title":"Proceedings of the IEEE Visualization Conference 2002","author":"Teoh S. T.","year":"2002","unstructured":"S. T. Teoh , K.-L. Ma , S. F. Wu , and X. Zhao . Case study: Interactive visualization for internet security . In Proceedings of the IEEE Visualization Conference 2002 , pages 505 -- 508 , 2002 .]] S. T. Teoh, K.-L. Ma, S. F. Wu, and X. Zhao. Case study: Interactive visualization for internet security. In Proceedings of the IEEE Visualization Conference 2002, pages 505--508, 2002.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISUAL.2003.1250415"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24693-0_22"},{"key":"e_1_3_2_1_22_1","unstructured":"Network Security Testbed based on Emulab. http:\/\/www.isi.deterlab.net.]]  Network Security Testbed based on Emulab. http:\/\/www.isi.deterlab.net.]]"},{"key":"e_1_3_2_1_23_1","volume-title":"The NIDES Statistical Components: Description and Justification. Technical report","author":"Javitz H.S.","year":"1993","unstructured":"H.S. Javitz and A. Valdes . The NIDES Statistical Components: Description and Justification. Technical report , SRI Network Information Center , March 1993 .]] H.S. Javitz and A. Valdes. The NIDES Statistical Components: Description and Justification. Technical report, SRI Network Information Center, March 1993.]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029215","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029208.1029215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:07Z","timestamp":1750264267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029208.1029215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":22,"alternative-id":["10.1145\/1029208.1029215","10.1145\/1029208"],"URL":"https:\/\/doi.org\/10.1145\/1029208.1029215","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}