{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:06Z","timestamp":1750220466584,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3482632.3484111","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T17:26:52Z","timestamp":1637602012000},"page":"2119-2122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Automatic Identification of Information Assets Based on Industrial Control Network Traffic"],"prefix":"10.1145","author":[{"given":"Wenjin","family":"Yu","sequence":"first","affiliation":[{"name":"Zhejiang China Tobacco Industry Co., Ltd, China"}]},{"given":"Yong","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang China Tobacco Industry Co., Ltd, China"}]},{"given":"Yixiang","family":"Jiang","sequence":"additional","affiliation":[{"name":"Zhejiang China Tobacco Industry Co., Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"126","volume-title":"Network traffic anomaly detection methods: ssae-16 IWELM - AdaBoost [J\/OL]. Journal of wuhan university (science edition)","author":"Xiaojian Li","year":"2020","unstructured":"Xiaojian Li xiao-yao xie, Yang Xu . Network traffic anomaly detection methods: ssae-16 IWELM - AdaBoost [J\/OL]. Journal of wuhan university (science edition) , vol. 2020 , no.02, pp. 126 - 134 , 2020 . https:\/\/doi.org\/10.14188\/j.1671-8836.2019.0508. 10.14188\/j.1671-8836.2019.0508 Xiaojian Li xiao-yao xie, Yang Xu. Network traffic anomaly detection methods: ssae-16 IWELM - AdaBoost [J\/OL]. Journal of wuhan university (science edition), vol.2020, no.02, pp.126-134, 2020. https:\/\/doi.org\/10.14188\/j.1671-8836.2019.0508."},{"key":"e_1_3_2_1_2_1","first-page":"822","volume-title":"zhigui liu. Research on data acquisition method for network traffic anomaly detection. Computer knowledge and technology","author":"Chen Mingbing","year":"2009","unstructured":"Mingbing Chen , zhigui liu. Research on data acquisition method for network traffic anomaly detection. Computer knowledge and technology , vol. 5 , no.04, pp. 822 - 824 , 2009 . Mingbing Chen, zhigui liu. Research on data acquisition method for network traffic anomaly detection. Computer knowledge and technology, vol.5, no.04, pp.822-824, 2009."},{"key":"e_1_3_2_1_3_1","first-page":"46","volume-title":"Network traffic anomaly detection based on time series graph mining. Computer science","author":"Zhou Yingjie","year":"2009","unstructured":"Yingjie Zhou , Guangmin Hu , Wisong He . Network traffic anomaly detection based on time series graph mining. Computer science , vol. 36 , no.01, pp. 46 - 50 , 2009 . Yingjie Zhou, Guangmin Hu, Wisong He. Network traffic anomaly detection based on time series graph mining. Computer science, vol.36, no.01, pp.46-50, 2009."},{"key":"e_1_3_2_1_4_1","first-page":"289","volume-title":"yongcheng wang, yanfei qiang, yuantao gu. Network traffic anomaly detection based on random mapping and clustering. Computer simulation","author":"Liu Yating","year":"2009","unstructured":"Yating Liu , yongcheng wang, yanfei qiang, yuantao gu. Network traffic anomaly detection based on random mapping and clustering. Computer simulation , vol. 36 , no.03, pp. 289 - 293 , 2009 . Yating Liu, yongcheng wang, yanfei qiang, yuantao gu. Network traffic anomaly detection based on random mapping and clustering. Computer simulation, vol.36, no.03, pp.289-293, 2009."},{"key":"e_1_3_2_1_5_1","first-page":"84","volume-title":"Research on abnormal detection of network traffic in big data environment. Science and technology wind","author":"Nong Ting","year":"2019","unstructured":"Ting Nong . Research on abnormal detection of network traffic in big data environment. Science and technology wind , vol. 2019 , no.17, pp. 84 , 2019 . Ting Nong. Research on abnormal detection of network traffic in big data environment. Science and technology wind, vol.2019, no.17, pp.84, 2019."},{"key":"e_1_3_2_1_6_1","first-page":"178","volume-title":"lipeng ma, guozi sun. A method for abnormal detection of network traffic based on wavelet analysis. Computer science","author":"Du Zhen","year":"2009","unstructured":"Zhen Du , lipeng ma, guozi sun. A method for abnormal detection of network traffic based on wavelet analysis. Computer science , vol. 46 , no.08, pp. 178 - 182 , 2009 . Zhen Du, lipeng ma, guozi sun. A method for abnormal detection of network traffic based on wavelet analysis. Computer science, vol.46, no.08, pp. 178-182, 2009."},{"key":"e_1_3_2_1_7_1","unstructured":"Peng Zhang Guangmin Hu.Journal of university of electronic science and technology vol.36 no.S2 pp.1007-1010 2009.  Peng Zhang Guangmin Hu.Journal of university of electronic science and technology vol.36 no.S2 pp.1007-1010 2009."}],"event":{"name":"ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education","acronym":"ICISCAE 2021","location":"Dalian China"},"container-title":["2021 4th International Conference on Information Systems and Computer Aided Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3484111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3482632.3484111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:20Z","timestamp":1750193300000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3484111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":7,"alternative-id":["10.1145\/3482632.3484111","10.1145\/3482632"],"URL":"https:\/\/doi.org\/10.1145\/3482632.3484111","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}