{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:05:05Z","timestamp":1771333505426,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,8]],"date-time":"2013-01-08T00:00:00Z","timestamp":1357603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,8]]},"DOI":"10.1145\/2459976.2460003","type":"proceedings-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T19:39:39Z","timestamp":1364845179000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A learning system for discriminating variants of malicious network traffic"],"prefix":"10.1145","author":[{"given":"Justin M.","family":"Beaver","sequence":"first","affiliation":[{"name":"Oak Ridge National Lab"}]},{"given":"Christopher T.","family":"Symons","sequence":"additional","affiliation":[{"name":"Oak Ridge National Lab"}]},{"given":"Robert E.","family":"Gillen","sequence":"additional","affiliation":[{"name":"Oak Ridge National Lab"}]}],"member":"320","published-online":{"date-parts":[[2013,1,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dua S. and Du X. 2011. Data Mining and Machine Learning in Cybersecurity. Boca Raton FL Taylor and Francis Group LLC.   Dua S. and Du X. 2011. Data Mining and Machine Learning in Cybersecurity . Boca Raton FL Taylor and Francis Group LLC."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364657"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381896.2381905"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2207821"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007614523901"},{"key":"e_1_3_2_1_10_1","unstructured":"Cohen W. W. 2004. MinorThird: Methods for identifying names and ontological relations in text using heuristics for inducing regularities from data. (2004). Available at: http:\/\/minorthird.sourceforge.net.  Cohen W. W. 2004. MinorThird: Methods for identifying names and ontological relations in text using heuristics for inducing regularities from data . (2004). Available at: http:\/\/minorthird.sourceforge.net."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150459"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1036158"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. the 2000 DARPA Information Survivability Conference and Exposition. (2000)","author":"Lippmann R. P."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.70"}],"event":{"name":"CSIIRW '13: Cyber Security and Information Intelligence","location":"Oak Ridge Tennessee USA","acronym":"CSIIRW '13","sponsor":["Los Alamos National Labs Los Alamos National Labs","Sandia National Labs Sandia National Laboratories","DOE Department of Energy","Oak Ridge National Laboratory","Lawrence Livermore National Lab. Lawrence Livermore National Laboratory","BERKELEYLAB Lawrence National Berkeley Laboratory","Argonne Natl Lab Argonne National Lab","Idaho National Lab. Idaho National Laboratory","Pacific Northwest National Laboratory","Nevada National Security Site Nevada National Security Site"]},"container-title":["Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2460003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2459976.2460003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:45Z","timestamp":1750234725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2459976.2460003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,8]]},"references-count":14,"alternative-id":["10.1145\/2459976.2460003","10.1145\/2459976"],"URL":"https:\/\/doi.org\/10.1145\/2459976.2460003","relation":{},"subject":[],"published":{"date-parts":[[2013,1,8]]},"assertion":[{"value":"2013-01-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}