{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:52:47Z","timestamp":1774367567709,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T00:00:00Z","timestamp":1284422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,14]]},"DOI":"10.1145\/1850795.1850801","type":"proceedings-article","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T13:14:34Z","timestamp":1283433274000},"page":"52-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["PeekKernelFlows"],"prefix":"10.1145","author":[{"given":"Cynthia","family":"Wagner","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"G\u00e9rard","family":"Wagener","sequence":"additional","affiliation":[{"name":"University of Luxembourg - SNT, Luxembourg"}]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]},{"given":"Alexandre","family":"Dulaunoy","sequence":"additional","affiliation":[{"name":"SES S.A., Ch\u00e2teau de Betzdorf, Betzdorf, Luxembourg"}]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2010,9,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"222","volume-title":"QoflS2001, LNCS 2156","author":"Cho K.","year":"2001","unstructured":"K. Cho , R. Kaizaki and A. Kato , Aguri: An aggregation-based traffic profiler , QoflS2001, LNCS 2156 , pp. 222 -- 242 , Springer Verlag , 2001 . K. Cho, R. Kaizaki and A. Kato, Aguri: An aggregation-based traffic profiler, QoflS2001, LNCS 2156, pp. 222--242, Springer Verlag, 2001."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of the Society for picture presentation","volume":"26","author":"Cowlishaw M. F.","unstructured":"M. F. Cowlishaw , Fundamental Requirements for picture presentation , In Proc. of the Society for picture presentation , vol. 26 no. 2, pp. 101--107, 1985. M. F. Cowlishaw, Fundamental Requirements for picture presentation, In Proc. of the Society for picture presentation, vol. 26 no. 2, pp. 101--107, 1985."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.49"},{"key":"e_1_3_2_1_4_1","volume-title":"6th International Workshop on Visualization for Cyber Security","author":"Glanfield J.","year":"2009","unstructured":"J. Glanfield , S. Brooks , T. Taylor , D. Paterson , C Smith , C. Gates , J. McHugh , OverFlow : An Overview Visualization for Network Analysis , 6th International Workshop on Visualization for Cyber Security . Atlantic City, NJ. , 2009 J. Glanfield, S. Brooks, T. Taylor, D. Paterson, C Smith, C. Gates, J. McHugh, OverFlow: An Overview Visualization for Network Analysis, 6th International Workshop on Visualization for Cyber Security. Atlantic City, NJ., 2009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/0-387-37977-0_10","volume-title":"Graphics of Large Data Sets: Visualizing a Million, Ed. A. Unwin, M. Theus, H. Hofmann","author":"Gonzalez-Arevalo B.","year":"2006","unstructured":"B. Gonzalez-Arevalo , F. Hernandez-Campos , J. S. Marron , C. Park , Visualization Challenges in Internet Traffic Research , Graphics of Large Data Sets: Visualizing a Million, Ed. A. Unwin, M. Theus, H. Hofmann , Springer , New York , pp. 203 -- 226 , 2006 . B. Gonzalez-Arevalo, F. Hernandez-Campos, J. S. Marron, C. Park, Visualization Challenges in Internet Traffic Research, Graphics of Large Data Sets: Visualizing a Million, Ed. A. Unwin, M. Theus, H. Hofmann, Springer, New York, pp. 203--226, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.47"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45235-5_83"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-56927-2","volume-title":"Self-Organizing Maps","author":"Kohonen T.","year":"2001","unstructured":"T. Kohonen , Self-Organizing Maps , 3 rd Edition, Springer Verlag , 2001 . T. Kohonen, Self-Organizing Maps, 3rd Edition, Springer Verlag, 2001.","edition":"3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641587.1641590"},{"key":"e_1_3_2_1_10_1","volume-title":"International Journal of Computer Applications, 0975-8887","author":"Patole V. A.","year":"2010","unstructured":"V. A. Patole , V. K. Pachghare , P. Kulkarni , Self Organizing Maps to build Intrusion Detection System , International Journal of Computer Applications, 0975-8887 , vol. 1 n. 8, 2010 . V. A. Patole, V. K. Pachghare, P. Kulkarni, Self Organizing Maps to build Intrusion Detection System, International Journal of Computer Applications, 0975-8887, vol. 1 n. 8, 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"Honeypots: Tracking Hackers","author":"Spitzner L.","year":"2002","unstructured":"L. Spitzner , Honeypots: Tracking Hackers , Addison-Wesley Professional , 2002 . L. Spitzner, Honeypots: Tracking Hackers, Addison-Wesley Professional, 2002."},{"key":"e_1_3_2_1_12_1","volume-title":"Statistical Learning Theory","author":"Vapnik V.","year":"1998","unstructured":"V. Vapnik , Statistical Learning Theory , Wiley , 1998 . V. Vapnik, Statistical Learning Theory, Wiley, 1998."}],"event":{"name":"VizSec '10: 7th International Symposium on Visualization for Cyber Security","location":"Ottawa Ontario Canada","acronym":"VizSec '10"},"container-title":["Proceedings of the Seventh International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1850795.1850801","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1850795.1850801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:50Z","timestamp":1750278410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1850795.1850801"}},"subtitle":["peeking into IP flows"],"short-title":[],"issued":{"date-parts":[[2010,9,14]]},"references-count":12,"alternative-id":["10.1145\/1850795.1850801","10.1145\/1850795"],"URL":"https:\/\/doi.org\/10.1145\/1850795.1850801","relation":{},"subject":[],"published":{"date-parts":[[2010,9,14]]},"assertion":[{"value":"2010-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}