{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:44:01Z","timestamp":1730342641931,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.23919\/cisti.2019.8760780","type":"proceedings-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:40:48Z","timestamp":1563237648000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A P2P Overlay System for Network Anomaly Detection in ISP Infrastructures"],"prefix":"10.23919","author":[{"given":"Miguel","family":"Silva","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Mendonca","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Sousa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/COMST.2005.1610546","article-title":"A Survey and Comparison of Peer-to-Peer Overlay Network Schemes","volume":"7","author":"lua","year":"2005","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GI.2007.4301435"},{"journal-title":"perfSONAR","year":"0","key":"ref10"},{"journal-title":"Neo4j","year":"0","key":"ref6"},{"journal-title":"Sam Knows","year":"0","key":"ref11"},{"journal-title":"JavaFX","year":"0","key":"ref5"},{"journal-title":"NLNOG RING","year":"0","key":"ref12"},{"key":"ref8","article-title":"An adaptable and ISP-friendly multicast overlay network","author":"sampaio","year":"2018","journal-title":"Peer-to-Peer Networking and Applications"},{"journal-title":"CORE Emulator","year":"0","key":"ref7"},{"key":"ref2","first-page":"197","article-title":"Overcast: Reliable Multicasting with an Overlay Network","volume":"4","author":"jannotti","year":"2000","journal-title":"Proc of the 4th Symposium on Operating System Design and Implementation"},{"journal-title":"RIPE Atlas","year":"0","key":"ref9"},{"key":"ref1","article-title":"CenterTrack: An IP Overlay Network for Tracking DoS Floods","volume":"9","author":"stone","year":"2000","journal-title":"Proc 9th Conference on USENIX Security Symposium"}],"event":{"name":"2019 14th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2019,6,19]]},"location":"Coimbra, Portugal","end":{"date-parts":[[2019,6,22]]}},"container-title":["2019 14th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8755443\/8760589\/08760780.pdf?arnumber=8760780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T17:46:33Z","timestamp":1581011193000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8760780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.23919\/cisti.2019.8760780","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}