{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:20:39Z","timestamp":1730344839600,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/tma.2018.8506575","type":"proceedings-article","created":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T23:53:55Z","timestamp":1540511635000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Degree-Based Outliers Detection Within IP Traffic Modelled as a Link Stream"],"prefix":"10.23919","author":[{"given":"Audrey","family":"Wilmet","sequence":"first","affiliation":[]},{"given":"Tiphaine","family":"Viard","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Latapy","sequence":"additional","affiliation":[]},{"given":"Robin","family":"Lamarche-Perrin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897806"},{"key":"ref11","article-title":"Network traffic anomaly detection","author":"huang","year":"0","journal-title":"ArXiv Preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658967"},{"key":"ref13","article-title":"An internet traffic data repository: The architecture and the design policy","author":"kato","year":"1999","journal-title":"Proc INET 99"},{"key":"ref14","article-title":"Anomaly detection in dynamic networks of varying size","author":"la fond","year":"0","journal-title":"ArXiv Preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015492"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/comnet\/cnt014"},{"key":"ref18","article-title":"Stream graphs and link streams for the modeling of interactions over time","author":"latapy","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref19","first-page":"79","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"USENIX Security Symposium"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061979"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2264634"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984928"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/1266761"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00316-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1865"},{"journal-title":"Data Mining Concepts and Techniques","year":"2011","author":"han","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2013.11"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1186\/1471-2105-7-123","article-title":"Detecting outliers when fitting data with nonlinear regression-a new method based on robust nonlinear regression and the false discovery rate","volume":"7","author":"motulsky","year":"2006","journal-title":"BMC Bioinformatics"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/1269899.1254895","article-title":"Sensitivity of pca for traffic anomaly detection","volume":"35","author":"ringberg","year":"2007","journal-title":"ACM Sigmetrics Performance Evaluation Review"},{"journal-title":"Numerical Recipes in C The Art of Scientific Computing","year":"1992","author":"press","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5121\/ijwmn.2017.9301"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1038\/ncomms13928","article-title":"Quantification of network structural dissimilarities","volume":"8","author":"schieber","year":"2017","journal-title":"Nature Communications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref25","article-title":"Discovering patterns of interest in ip traffic using cliques in bipartite link streams","author":"viard","year":"2018","journal-title":"Proceedings of the International Conference on Complex Networks (CompleNet)"}],"event":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","start":{"date-parts":[[2018,6,26]]},"location":"Vienna","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Network Traffic Measurement and Analysis Conference (TMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488332\/8506485\/08506575.pdf?arnumber=8506575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:55:25Z","timestamp":1643234125000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.23919\/tma.2018.8506575","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}