{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:40:47Z","timestamp":1762004447646,"version":"3.40.3"},"reference-count":26,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Simulation Modelling Practice and Theory"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1016\/j.simpat.2012.07.002","type":"journal-article","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T17:00:49Z","timestamp":1346950849000},"page":"173-180","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Real-time network data analysis using time series models"],"prefix":"10.1016","volume":"29","author":[{"given":"Thanasis","family":"Vafeiadis","sequence":"first","affiliation":[]},{"given":"Alexandros","family":"Papanikolaou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Ilioudis","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Charchalakis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.simpat.2012.07.002_b0005","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TKDE.2005.21","article-title":"Combining partitional and hierarchical algorithms for robust and efficient data clustering with cohesion self-merging","volume":"17","author":"Lin","year":"2005","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"10.1016\/j.simpat.2012.07.002_b0010","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/1030194.1015492","article-title":"Diagnosing network-wide traffic anomalies","volume":"34","author":"Lakhina","year":"2004","journal-title":"ACM SIGCOMM \u2013 Computer Communication Review"},{"doi-asserted-by":"crossref","unstructured":"B. Babcock, S. Babu, M. Datar, R. Motwani, J. Widom, Models and issues in data stream systems, in: 21st ACM SIGMOD International Conference on Management of Data, ACM, Madison, Wisconsin, 2002, pp. 1\u201316.","key":"10.1016\/j.simpat.2012.07.002_b0015","DOI":"10.1145\/543613.543615"},{"doi-asserted-by":"crossref","unstructured":"C. Morariu, B. Stiller, DiCAP: distributed packet capturing architecture for high-speed network links, in: 33rd IEEE Conference on Local Computer Networks (LCN) 2008, Montreal, Que, 2008, pp. 168\u2013175.","key":"10.1016\/j.simpat.2012.07.002_b0020","DOI":"10.1109\/LCN.2008.4664166"},{"unstructured":"S. Savage, Sting: a TCP-based network measurement tool, in: USENIX Symposium on Internet Technologies and Systems, USITS, vol. 2, Boulder, Colorado, 1999, pp. 7.","key":"10.1016\/j.simpat.2012.07.002_b0025"},{"doi-asserted-by":"crossref","unstructured":"P. Benko, A. Veres, A passive method for estimating end-to-end TCP packet loss, in: IEEE Globecom, 2002, pp. 2609\u20132613.","key":"10.1016\/j.simpat.2012.07.002_b0030","DOI":"10.1109\/GLOCOM.2002.1189102"},{"unstructured":"S. Ohta, T. Miyazaki, Passive packet loss monitoring that employs the hash-based identification technique, in: 9th IFIP\/IEEE International Symposium on Integrated Network Management (IM), Nice, France, poster Program (Session 2), 15\u201319 May 2005.","key":"10.1016\/j.simpat.2012.07.002_b0035"},{"doi-asserted-by":"crossref","unstructured":"A. Friedl, S. Ubik, A. Kapravelos, M. Polychronakis, E.P. Markatos, Realistic passive packet loss measurement for high-speed networks, in: M. Papadopouli, P. Owezarski, A. Pras (Eds.), Traffic Monitoring and Analysis, Lecture Notes in Computer Science, Aachen, Germany, 2009, pp. 1\u20137.","key":"10.1016\/j.simpat.2012.07.002_b0040","DOI":"10.1007\/978-3-642-01645-5_1"},{"doi-asserted-by":"crossref","unstructured":"J. Li, L. Shen, Y. Tong, prediction of network flow based on wavelet analysis and ARIMA model, in: International Conference on Wireless Networks and Information Systems \u2013 WNIS \u201909, Shanghai, China, 2009, pp. 217\u2013220.","key":"10.1016\/j.simpat.2012.07.002_b0045","DOI":"10.1109\/WNIS.2009.20"},{"issue":"3","key":"10.1016\/j.simpat.2012.07.002_b0050","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/90.392383","article-title":"Wide area traffic: the failure of poisson modeling","volume":"3","author":"Paxson","year":"1995","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"8","key":"10.1016\/j.simpat.2012.07.002_b0055","first-page":"961","article-title":"Where mathematics meets the internet","volume":"45","author":"Willinger","year":"1998","journal-title":"Notices of the American Mathematical Society"},{"issue":"1","key":"10.1016\/j.simpat.2012.07.002_b0060","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/90.554723","article-title":"Self-similarity through high variability: statistical analysis of ethernet LAN traffic at the source level","volume":"5","author":"Willinger","year":"1997","journal-title":"IEEE\/ACM Transactions on Networking"},{"year":"1999","author":"Haykin","series-title":"Neural Networks","key":"10.1016\/j.simpat.2012.07.002_b0065"},{"issue":"1","key":"10.1016\/j.simpat.2012.07.002_b0070","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s10489-006-6929-9","article-title":"Discovering trends in large datasets using neural networks","volume":"24","author":"Kaikhah","year":"2006","journal-title":"Applied Intelligence"},{"key":"10.1016\/j.simpat.2012.07.002_b0075","series-title":"IEEE International Conference on Industrial Technology (ICIT 2005)","first-page":"688","article-title":"A neural network for mining large volumes of time series data","author":"Liang","year":"2005"},{"issue":"4","key":"10.1016\/j.simpat.2012.07.002_b0080","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1057\/palgrave.sj.8350073","article-title":"Bootstrap-based simple probability model for classifying network traffic and detecting network intrusion","volume":"21","author":"Wang","year":"2008","journal-title":"Security Journal"},{"doi-asserted-by":"crossref","unstructured":"K. Papagiannaki, N. Taft, Z.-L. Zhang, C. Diot, Long-term forecasting of internet backbone traffic: observations and initial models, in: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol. 2, 2003, pp. 1178\u20131188.","key":"10.1016\/j.simpat.2012.07.002_b0085","DOI":"10.1109\/INFCOM.2003.1208954"},{"key":"10.1016\/j.simpat.2012.07.002_b0090","series-title":"Frontiers in Queueing: Models, Methods and Problems","first-page":"271","article-title":"Stochastic modeling of traffic processes","author":"Jagerman","year":"1996"},{"key":"10.1016\/j.simpat.2012.07.002_b0095","first-page":"285","article-title":"A network measurement architecture for adaptive applications","volume":"vol. 1","author":"Stemm","year":"2000"},{"doi-asserted-by":"crossref","unstructured":"D.A. Vivanco, A.P. Jayasumana, A measurement-based modeling approach for network-induced packet delay, in: 32nd IEEE Conference on Local Computer Networks \u2013 LCN 2007, Dublin, 2007, pp. 175\u2013182.","key":"10.1016\/j.simpat.2012.07.002_b0100","DOI":"10.1109\/LCN.2007.136"},{"year":"1997","author":"Chatfield","series-title":"The Analysis of Time Series","key":"10.1016\/j.simpat.2012.07.002_b0105"},{"year":"1976","author":"Box","series-title":"Time Series Analysis: Forecasting and Control","key":"10.1016\/j.simpat.2012.07.002_b0110"},{"year":"1990","author":"Diggle","series-title":"Time Series: A Biostatistical Introduction","key":"10.1016\/j.simpat.2012.07.002_b0115"},{"issue":"2","key":"10.1016\/j.simpat.2012.07.002_b0120","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1214\/aos\/1176344136","article-title":"Estimating the Dimension of a Model","volume":"6","author":"Schwarz","year":"1978","journal-title":"Annals of Statistics"},{"year":"1990","author":"Wei","series-title":"Time Series Analysis: Univariate and Multivariate Methods","key":"10.1016\/j.simpat.2012.07.002_b0125"},{"issue":"6","key":"10.1016\/j.simpat.2012.07.002_b0130","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TAC.1974.1100705","article-title":"A new look at the statistical model identification","volume":"19","author":"Akaike","year":"1974","journal-title":"IEEE Transactions on Automatic Control"}],"container-title":["Simulation Modelling Practice and Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1569190X12000986?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1569190X12000986?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:45:53Z","timestamp":1744069553000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1569190X12000986"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":26,"alternative-id":["S1569190X12000986"],"URL":"https:\/\/doi.org\/10.1016\/j.simpat.2012.07.002","relation":{},"ISSN":["1569-190X"],"issn-type":[{"type":"print","value":"1569-190X"}],"subject":[],"published":{"date-parts":[[2012,12]]}}}