{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:26:34Z","timestamp":1769747194348,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["101021797"],"award-info":[{"award-number":["101021797"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670882","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1459-2695","authenticated-orcid":false,"given":"Miko\u0142aj","family":"Komisarek","sequence":"first","affiliation":[{"name":"ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5881-6406","authenticated-orcid":false,"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9327-0138","authenticated-orcid":false,"given":"Salvatore","family":"D'Antonio","sequence":"additional","affiliation":[{"name":"Naples University Parthenope, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4380-014X","authenticated-orcid":false,"given":"Aleksandra","family":"Pawlicka","sequence":"additional","affiliation":[{"name":"Warsaw University, POLAND, Poland and ITTI Sp. z o. o., Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1405-9911","authenticated-orcid":false,"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology, Poland and ITTI Sp. z o.o., Poland"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC57344.2023.10099340"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10232919"},{"key":"e_1_3_2_1_4_1","unstructured":"Andrzej Bargiela and Witold Pedrycz. 2022. Granular computing. In HANDBOOK ON COMPUTER LEARNING AND INTELLIGENCE: Volume 2: Deep Learning Intelligent Control and Evolutionary Computation. World Scientific 97\u2013132."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"G\u00e9rard Biau. 2010. Analysis of a Random Forests Model. https:\/\/doi.org\/10.48550\/ARXIV.1005.0208","DOI":"10.48550\/ARXIV.1005.0208"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4805035"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NetCIT54147.2021.00017"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2634-8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC57223.2023.10074111"},{"key":"e_1_3_2_1_10_1","volume-title":"How to effectively collect and process network data for intrusion detection?Entropy 23, 11","author":"Komisarek Miko\u0142aj","year":"2021","unstructured":"Miko\u0142aj Komisarek, Marek Pawlicki, Rafa\u0142 Kozik, Witold Ho\u0142ubowicz, and Micha\u0142 Chora\u015b. 2021. How to effectively collect and process network data for intrusion detection?Entropy 23, 11 (2021), 1532."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21186225"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-223649"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Ryan Mills. 2024. LUFlow Network Intrusion Detection Data Set. https:\/\/doi.org\/10.34740\/KAGGLE\/DSV\/7594192","DOI":"10.34740\/KAGGLE\/DSV\/7594192"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01568-7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233259"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.23940\/ijpe.18.05.p24.10501059"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3246660"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003099"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:55:11Z","timestamp":1755881711000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":20,"alternative-id":["10.1145\/3664476.3670882","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670882","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}