{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:37:54Z","timestamp":1762004274031,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T00:00:00Z","timestamp":1284422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,14]]},"DOI":"10.1145\/1850795.1850805","type":"proceedings-article","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T13:14:34Z","timestamp":1283433274000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Real-time visualization of network behaviors for situational awareness"],"prefix":"10.1145","author":[{"given":"Daniel M.","family":"Best","sequence":"first","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]},{"given":"Shawn","family":"Bohn","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]},{"given":"Douglas","family":"Love","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]},{"given":"Adam","family":"Wynne","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]},{"given":"William A.","family":"Pike","sequence":"additional","affiliation":[{"name":"Pacific Northwest National Laboratory, Richland, WA"}]}],"member":"320","published-online":{"date-parts":[[2010,9,14]]},"reference":[{"volume-title":"Retrieved","year":"2010","author":"Mule Enterprise Service Bus","key":"e_1_3_2_1_1_1"},{"volume-title":"Retrieved","year":"2010","author":"Web Services Business Process","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2008.21"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.19"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357286"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Cahill M. H. Lambert D. Pinheiro J. C. and Sun D. X. 2002. Detecting fraud in the real world. In Handbook of Massive Data Sets J. Abello P. M. Pardalos and M. G. Resende Eds. Kluwer Academic Publishers Norwell MA 911--929.   Cahill M. H. Lambert D. Pinheiro J. C. and Sun D. X. 2002. Detecting fraud in the real world. In Handbook of Massive Data Sets J. Abello P. M. Pardalos and M. G. Resende Eds. Kluwer Academic Publishers Norwell MA 911--929.","DOI":"10.1007\/978-1-4615-0005-6_26"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.04.008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347107"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.79"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/882082.882086"},{"key":"e_1_3_2_1_11_1","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions and reversals","volume":"10","author":"Levenshtein V. I.","year":"1966","journal-title":"Soviet Physics Doklady."},{"volume-title":"Proceedings of Visualization for Computer Security","year":"2007","author":"Phan D.","key":"e_1_3_2_1_12_1"},{"volume-title":"Proceedings of the IEEE Symposium on information Visualization 2001 (October 22-23, 2001). INFOVIS'01. IEEE Computer Society","author":"Weber M.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495940"},{"volume-title":"Proceedings of the 14th USENIX Conference on System Administration (New Orleans, Louisiana, December 03-08, 2000). System Administration Conference. USENIX Association","year":"2000","author":"Plonka D.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/38.708554"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2007.342984"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.18"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.18"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018435.1021698"}],"event":{"name":"VizSec '10: 7th International Symposium on Visualization for Cyber Security","acronym":"VizSec '10","location":"Ottawa Ontario Canada"},"container-title":["Proceedings of the Seventh International Symposium on Visualization for Cyber Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1850795.1850805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1850795.1850805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:50Z","timestamp":1750278410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1850795.1850805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,14]]},"references-count":21,"alternative-id":["10.1145\/1850795.1850805","10.1145\/1850795"],"URL":"https:\/\/doi.org\/10.1145\/1850795.1850805","relation":{},"subject":[],"published":{"date-parts":[[2010,9,14]]},"assertion":[{"value":"2010-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}