{"_id":"u4ja8Fz2QSy5WbBTH","bibbaseid":"ahmed-mahmood-networktrafficpatternanalysisusingimprovedinformationtheoreticcoclusteringbasedcollectiveanomalydetection-2014","downloads":0,"creationDate":"2016-02-17T10:30:07.986Z","title":"Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.","author_short":["Ahmed, M.","Mahmood, A. N."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/\"ahmed shamsul arefin\"?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2015-12-04T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Ahmed"],"firstnames":["Mohiuddin"],"suffixes":[]},{"propositions":[],"lastnames":["Mahmood"],"firstnames":["Abdun","Naser"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2a5690592a82410cefb36112553b142f7/dblp","booktitle":"SecureComm (2)","crossref":"conf/securecomm/2014-2","editor":[{"propositions":[],"lastnames":["Tian"],"firstnames":["Jing"],"suffixes":[]},{"propositions":[],"lastnames":["Jing"],"firstnames":["Jiwu"],"suffixes":[]},{"propositions":[],"lastnames":["Srivatsa"],"firstnames":["Mudhakar"],"suffixes":[]}],"ee":"http://dx.doi.org/10.1007/978-3-319-23802-9_17","interhash":"ae62f5be085cddf54dd29512bd6c71d2","intrahash":"a5690592a82410cefb36112553b142f7","isbn":"978-3-319-23801-2","keywords":"dblp","pages":"204-219","publisher":"Springer","series":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","timestamp":"2015-12-10T12:01:31.000+0100","title":"Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.","url":"http://dblp.uni-trier.de/db/conf/securecomm/securecomm2014-2.html#AhmedM14","volume":"153","year":"2014","bibtex":"@inproceedings{conf/securecomm/AhmedM14,\n added-at = {2015-12-04T00:00:00.000+0100},\n author = {Ahmed, Mohiuddin and Mahmood, Abdun Naser},\n biburl = {http://www.bibsonomy.org/bibtex/2a5690592a82410cefb36112553b142f7/dblp},\n booktitle = {SecureComm (2)},\n crossref = {conf/securecomm/2014-2},\n editor = {Tian, Jing and Jing, Jiwu and Srivatsa, Mudhakar},\n ee = {http://dx.doi.org/10.1007/978-3-319-23802-9_17},\n interhash = {ae62f5be085cddf54dd29512bd6c71d2},\n intrahash = {a5690592a82410cefb36112553b142f7},\n isbn = {978-3-319-23801-2},\n keywords = {dblp},\n pages = {204-219},\n publisher = {Springer},\n series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},\n timestamp = {2015-12-10T12:01:31.000+0100},\n title = {Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection.},\n url = {http://dblp.uni-trier.de/db/conf/securecomm/securecomm2014-2.html#AhmedM14},\n volume = 153,\n year = 2014\n}\n\n","author_short":["Ahmed, M.","Mahmood, A. N."],"editor_short":["Tian, J.","Jing, J.","Srivatsa, M."],"key":"conf/securecomm/AhmedM14","id":"conf/securecomm/AhmedM14","bibbaseid":"ahmed-mahmood-networktrafficpatternanalysisusingimprovedinformationtheoreticcoclusteringbasedcollectiveanomalydetection-2014","role":"author","urls":{"Link":"http://dx.doi.org/10.1007/978-3-319-23802-9_17","Paper":"http://dblp.uni-trier.de/db/conf/securecomm/securecomm2014-2.html#AhmedM14"},"keyword":["dblp"],"downloads":0},"search_terms":["network","traffic","pattern","analysis","using","improved","information","theoretic","clustering","based","collective","anomaly","detection","ahmed","mahmood"],"keywords":["dblp"],"authorIDs":[],"dataSources":["XA98H7MrAfSrDfP6g"]}