{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:13Z","timestamp":1750307173461,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,26]],"date-time":"2011-10-26T00:00:00Z","timestamp":1319587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["257315"],"award-info":[{"award-number":["257315"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,26]]},"DOI":"10.1145\/2093698.2093767","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Combining wavelet analysis and information theory for network anomaly detection"],"prefix":"10.1145","author":[{"given":"Christian","family":"Callegari","sequence":"first","affiliation":[{"name":"University of Pisa, Pisa, Italy"}]},{"given":"Michele","family":"Pagano","sequence":"additional","affiliation":[{"name":"University of Pisa, Pisa, Italy"}]},{"given":"Stefano","family":"Giordano","sequence":"additional","affiliation":[{"name":"University of Pisa, Pisa, Italy"}]},{"given":"Teresa","family":"Pepe","sequence":"additional","affiliation":[{"name":"University of Pisa, Pisa, Italy"}]}],"member":"320","published-online":{"date-parts":[[2011,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Flow-Tools Home Page. http:\/\/www.ietf.org\/rfc\/rfc3954.txt.  Flow-Tools Home Page. http:\/\/www.ietf.org\/rfc\/rfc3954.txt."},{"key":"e_1_3_2_1_2_1","unstructured":"The Internet2 Network. http:\/\/www.internet2.edu\/network\/.  The Internet2 Network. http:\/\/www.internet2.edu\/network\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815473"},{"key":"e_1_3_2_1_5_1","volume-title":"Oct.","author":"Claise B.","year":"2004","unstructured":"B. Claise . Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) , Oct. 2004 . B. Claise. Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational), Oct. 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Proceedings of Global Telecommunications Conference 2006. GLOBECOM '06. IEEE","author":"Dainotti A.","year":"2006","unstructured":"A. Dainotti , A. Pescape' , and G. Ventre . Wavelet-based detection of dos attacks . In Proceedings of Global Telecommunications Conference 2006. GLOBECOM '06. IEEE , pages 1 -- 6 , 2006 . A. Dainotti, A. Pescape', and G. Ventre. Wavelet-based detection of dos attacks. In Proceedings of Global Telecommunications Conference 2006. GLOBECOM '06. IEEE, pages 1--6, 2006."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611970104","volume-title":"Ten lectures on Wavelets. no. 61 in CBMS-NSF Series in Applied Mathematics","author":"Daubechies I.","year":"1992","unstructured":"I. Daubechies . Ten lectures on Wavelets. no. 61 in CBMS-NSF Series in Applied Mathematics . SIAM , Philadelphia , 1992 . I. Daubechies. Ten lectures on Wavelets. no. 61 in CBMS-NSF Series in Applied Mathematics. SIAM, Philadelphia, 1992."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505229"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"e_1_3_2_1_13_1","volume-title":"Mining anomalies using traffic feature distributions. Technical report","author":"Lakhina A.","year":"2005","unstructured":"A. Lakhina , M. Crovella , and C. Diot . Mining anomalies using traffic feature distributions. Technical report , 2005 . A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. Technical report, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/29.45554"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of 4th International Workshop on Internet Performance, Simulation, Monitoring and Measurement, IPS-MOME","author":"Pascal C.-M.-C.","year":"2006","unstructured":"C.-M.-C. Pascal and C. Fabrice . Finding hierarchical heavy hitters with the count min sketch . In Proceedings of 4th International Workshop on Internet Performance, Simulation, Monitoring and Measurement, IPS-MOME , 2006 . C.-M.-C. Pascal and C. Fabrice. Finding hierarchical heavy hitters with the count min sketch. In Proceedings of 4th International Workshop on Internet Performance, Simulation, Monitoring and Measurement, IPS-MOME, 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/982792.982884"}],"event":{"name":"ISABEL '11: International Symposium on Applied Sciences in Biomedical and Communication Technologies","sponsor":["Universitat Pompeu Fabra","IEEE","Technical University of Catalonia Spain Technical University of Catalonia (UPC), Spain","River Publishers River Publishers","CTTC Technological Center for Telecommunications of Catalonia","CTIF Kyranova Ltd, Center for TeleInFrastruktur"],"location":"Barcelona Spain","acronym":"ISABEL '11"},"container-title":["Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2093698.2093767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:49Z","timestamp":1750240489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2093698.2093767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,26]]},"references-count":18,"alternative-id":["10.1145\/2093698.2093767","10.1145\/2093698"],"URL":"https:\/\/doi.org\/10.1145\/2093698.2093767","relation":{},"subject":[],"published":{"date-parts":[[2011,10,26]]},"assertion":[{"value":"2011-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}