{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:39:01Z","timestamp":1729629541029,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/milcom.2012.6415763","type":"proceedings-article","created":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T12:24:53Z","timestamp":1359635093000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Detecting communication anomalies in tactical networks via graph learning"],"prefix":"10.1109","author":[{"given":"Akshay","family":"Vashist","sequence":"first","affiliation":[]},{"given":"Ritu","family":"Chadha","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kaplan","sequence":"additional","affiliation":[]},{"given":"Kimberly","family":"Moeltner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730256"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415701"},{"key":"16","first-page":"83","article-title":"Sulla determinazione empirica di una legge di distribuzione","volume":"4","author":"kolmogorov","year":"1933","journal-title":"G Inst Ital Attuari"},{"journal-title":"PreludeIDS Technologies","year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4765"},{"key":"11","article-title":"Oddball: Spotting anomalies in weighted graphs","author":"akoglu","year":"0","journal-title":"Proc PAKDD 2010"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-159749207-2.50005-1"},{"key":"3","article-title":"A survey of anomaly detection methods in networks","author":"yang","year":"2009","journal-title":"Proc Intl Symp on Computer Network and Multimedia Technology"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470227718"},{"journal-title":"Uses Scan Statistics on A Graph of the Email Data Represented As A Time-series","year":"2007","author":"priebe","key":"10"},{"key":"7","first-page":"112","article-title":"AutoPart: Parameter-free graph patitioning and outlier detection","author":"chakrabarti","year":"2004","journal-title":"Proc 8th European Conf on Principles and Practice of Knowledge Discovery in Databases"},{"key":"6","first-page":"171","article-title":"Unsupervised link discovery in multirelational dat avia rarity analysis","author":"lin","year":"2003","journal-title":"Proc IEEE Int Conf Data Mining"},{"key":"5","doi-asserted-by":"crossref","first-page":"663","DOI":"10.3233\/IDA-2007-11606","article-title":"Anomaly detection in data represented as graphs","volume":"11","author":"eberle","year":"2007","journal-title":"Intelligent Data Analysis An International Journal"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956831"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117460"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1134271.1134282"}],"event":{"name":"MILCOM 2012 - 2012 IEEE Military Communications Conference","start":{"date-parts":[[2012,10,29]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2012,11,1]]}},"container-title":["MILCOM 2012 - 2012 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6383191\/6415559\/06415763.pdf?arnumber=6415763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T23:01:13Z","timestamp":1562626873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6415763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/milcom.2012.6415763","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}