{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:12Z","timestamp":1750220832310,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T00:00:00Z","timestamp":1571356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,18]]},"DOI":"10.1145\/3366650.3366669","type":"proceedings-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T13:04:52Z","timestamp":1577106292000},"page":"154-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["NetFlowTotal"],"prefix":"10.1145","author":[{"given":"Tzung-Han","family":"Jeng","sequence":"first","affiliation":[{"name":"Information and Communication Security Laboratory, Chunghwa Telecommunication Labs, Taiwan and Department of Information Management, National Central University, Taiwan"}]},{"given":"Wei-Ming","family":"Chan","sequence":"additional","affiliation":[{"name":"Information and Communication Security Laboratory, Chunghwa Telecommunication Labs, Taiwan"}]},{"given":"Wen-Yang","family":"Luo","sequence":"additional","affiliation":[{"name":"Information and Communication Security Laboratory, Chunghwa Telecommunication Labs, Taiwan"}]},{"given":"Chuan-Chiang","family":"Huang","sequence":"additional","affiliation":[{"name":"Information and Communication Security Laboratory, Chunghwa Telecommunication Labs, Taiwan"}]},{"given":"Chien-Chih","family":"Chen","sequence":"additional","affiliation":[{"name":"Information and Communication Security Laboratory, Chunghwa Telecommunication Labs, Taiwan"}]},{"given":"Yi-Ming","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Central University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2019,10,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Brown R. and Lee R. M. 2019. The Evolution of Cyber Threat Intelligence (CTI): 2019 SANS CTI Survey. Technical Report. SANS Institute."},{"key":"e_1_3_2_1_2_1","unstructured":"Chris J. Lee B. David W. Julie S. and Clem S. 2016. Guide to Cyber Threat Information Sharing. Technical Report. National Institute of Standards and Technology."},{"volume-title":"What is Cyber Threat Intelligence?","author":"Intel and Analysis Working Group","key":"e_1_3_2_1_3_1","unstructured":"Intel and Analysis Working Group. 2019. What is Cyber Threat Intelligence?, Center for Internet Security. Retrieved from https:\/\/www.cisecurity.org\/blog\/what-is-cyber-threat-intelligence\/"},{"key":"e_1_3_2_1_4_1","unstructured":"MISP - Open Source Threat Intelligence Platform and Open Standards for Threat Information Sharing. 2019. Retrieved from https:\/\/www.misp-project.org\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625170"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataService.2017.16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3163058.3163061"},{"key":"e_1_3_2_1_8_1","unstructured":"Wagner T. 2014. Getting started with AWS lambda. Aws re:invent 2014 (MBL202). Retrieved from https:\/\/www.youtube.com\/watch?v=UFj27laTWQA"},{"key":"e_1_3_2_1_9_1","unstructured":"Google Cloud. 2019. Google Cloud Functions. Retrieved from https:\/\/cloud.google.com\/functions\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Microsoft Azure. 2019. Azure Functions. Retrieved from https:\/\/functions.azure.com\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Incubator-openwhisk. 2019. Openwhisk. Retrieved from https:\/\/github.com\/openwhisk\/openwhisk"},{"key":"e_1_3_2_1_12_1","volume-title":"Serverless Computing: Current Trends and Open Problems. Research Advances in Cloud Computing","author":"Baldini I.","year":"2017","unstructured":"Baldini, I., Castro, P., Chang, K., Cheng, P., Fink, S., Ishakian, V., Mitchell, N., Muthusamy, V., Rabbah, R., Slominski, A. and Suter, P. 2017. Serverless Computing: Current Trends and Open Problems. Research Advances in Cloud Computing. Springer, 1--20."},{"key":"e_1_3_2_1_13_1","unstructured":"Cloudflare. 2019. What is serverless computing?. Retrieved from https:\/\/www.cloudflare.com\/learning\/serverless\/what-is-serverless\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Jeng T. H. Luo W. Y. Huang C. C. Chen C. C. Chang K. H. and Chen Y. M. 2019. Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration. International Journal of Grid and High Performance Computing. In press."},{"key":"e_1_3_2_1_15_1","unstructured":"TheHive. 2019. Security Incident Response Platform. Retrieved from https:\/\/thehive-project.org\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Cortex. 2019. Powerful Observable Analysis and Active Response Engine. Retrieved from https:\/\/github.com\/TheHive-Project\/Cortex"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Hastie T. Tibshirani R. and Friedman J. 2009. The Elements of Statistical Learning: Data Mining Inference and Prediction. Springer. New York.","DOI":"10.1007\/978-0-387-84858-7"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet.","author":"Cooke E.","year":"2005","unstructured":"Cooke, E. Jahanian, F. and McPherson D. 2005. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet. (Cambridge, MA, July 7, 2005). 39--44."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.86"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2015.7389699"}],"event":{"name":"ICCBD 2019: 2019 the 2nd International Conference on Computing and Big Data","acronym":"ICCBD 2019","location":"Taichung Taiwan"},"container-title":["Proceedings of the 2nd International Conference on Computing and Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366650.3366669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366650.3366669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:34Z","timestamp":1750202014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366650.3366669"}},"subtitle":["A Cloud Service Integration Platform for Malicious Traffic Analysis and Collaboration"],"short-title":[],"issued":{"date-parts":[[2019,10,18]]},"references-count":20,"alternative-id":["10.1145\/3366650.3366669","10.1145\/3366650"],"URL":"https:\/\/doi.org\/10.1145\/3366650.3366669","relation":{},"subject":[],"published":{"date-parts":[[2019,10,18]]},"assertion":[{"value":"2019-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}