{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T13:11:24Z","timestamp":1723209084962},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/e2emon.2007.375319","type":"proceedings-article","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T19:42:13Z","timestamp":1183059733000},"source":"Crossref","is-referenced-by-count":5,"title":["A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring"],"prefix":"10.1109","author":[{"given":"Taghrid","family":"Samak","sequence":"first","affiliation":[]},{"given":"Adel","family":"El-Atawy","sequence":"additional","affiliation":[]},{"given":"Ehab","family":"Al-Shaer","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ismail","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029215"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330146"},{"key":"11","first-page":"265","article-title":"Interactive visualization for network and port scan detection","author":"muelder","year":"2005","journal-title":"RAID"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0871-6","author":"sagan","year":"1994","journal-title":"Space-Filling Curves"},{"key":"3","year":"0"},{"key":"2","article-title":"Root polar layout of internet address data for security administration","author":"fink","year":"2005","journal-title":"VizSEC"},{"key":"1","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532063"},{"key":"7","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/585147.585179","article-title":"Performance of multi-dimensional space-filling curves","author":"mokbel","year":"2002","journal-title":"GIS '02 Proceedings of the 10th ACM international symposium on Advances in geographic information systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"5","first-page":"217","article-title":"Mining anomalies using traffic feature distributions","author":"lakhina","year":"2005","journal-title":"Proceedings of SIGCOMM 2005"},{"key":"4","article-title":"A study of analyzing network traffic as images in real-time","author":"kim","year":"2005","journal-title":"INFOCOM"},{"key":"9","article-title":"Case Study: Interactive Visualization for Internet Security","year":"2002","journal-title":"IEEE Visualization 2002 Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/69.908985"}],"event":{"name":"Fifth IEEE\/IFIP Workshop on End-to-End Monitoring Techniques and Services, E2EMON'07","location":"Munich","start":{"date-parts":[[2007,5,21]]},"end":{"date-parts":[[2007,5,21]]}},"container-title":["2007 Workshop on End-to-End Monitoring Techniques and Services"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4261330\/4261331\/04261340.pdf?arnumber=4261340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T20:28:41Z","timestamp":1580934521000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4261340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/e2emon.2007.375319","relation":{},"subject":[],"published":{"date-parts":[[2007,5]]}}}