{"id":"https://openalex.org/W2767936830","doi":"https://doi.org/10.1145/3132847.3133111","title":"Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining","display_name":"Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining","publication_year":2017,"publication_date":"2017-11-06","ids":{"openalex":"https://openalex.org/W2767936830","doi":"https://doi.org/10.1145/3132847.3133111","mag":"2767936830"},"language":"en","primary_location":{"id":"doi:10.1145/3132847.3133111","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132847.3133111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066311739","display_name":"Elaheh Alipour Chavary","orcid":"https://orcid.org/0000-0002-4666-9549"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Elaheh Alipour Chavary","raw_affiliation_strings":["University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070030398","display_name":"Sarah Erfani","orcid":"https://orcid.org/0000-0003-0885-0643"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sarah M. Erfani","raw_affiliation_strings":["University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076014464","display_name":"Christopher Leckie","orcid":"https://orcid.org/0000-0002-4388-0517"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Christopher Leckie","raw_affiliation_strings":["University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066311739"],"corresponding_institution_ids":["https://openalex.org/I165779595"],"apc_list":null,"apc_paid":null,"fwci":1.036,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.80599625,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2015","last_page":"2018"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.8763196468353271},{"id":"https://openalex.org/keywords/contrast","display_name":"Contrast (vision)","score":0.8027205467224121},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7912881374359131},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6473668217658997},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6130874752998352},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.4461624324321747},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4373458921909332},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.405697762966156},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36485689878463745},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16937366127967834},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08603504300117493}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.8763196468353271},{"id":"https://openalex.org/C2776502983","wikidata":"https://www.wikidata.org/wiki/Q690182","display_name":"Contrast (vision)","level":2,"score":0.8027205467224121},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7912881374359131},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6473668217658997},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6130874752998352},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.4461624324321747},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4373458921909332},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.405697762966156},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36485689878463745},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16937366127967834},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08603504300117493},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3132847.3133111","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3132847.3133111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM on Conference on Information and Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1991400162","https://openalex.org/W2013525544","https://openalex.org/W2101896525","https://openalex.org/W2124066753","https://openalex.org/W2150267789","https://openalex.org/W2161970221","https://openalex.org/W2162034534","https://openalex.org/W2167450247","https://openalex.org/W4245280987","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2905433371","https://openalex.org/W4390569940","https://openalex.org/W2888392564","https://openalex.org/W4361193272","https://openalex.org/W4310278675","https://openalex.org/W4388422664","https://openalex.org/W2806259446","https://openalex.org/W2963326959","https://openalex.org/W4312407344","https://openalex.org/W2068548071"],"abstract_inverted_index":{"Extracting":[0],"knowledge":[1],"from":[2,94],"the":[3,43,81,122,135,139],"massive":[4],"volumes":[5],"of":[6,45,83,124,142,161],"network":[7,14,20,30,66],"traffic":[8,41,67,112,153],"is":[9,52],"an":[10,53],"important":[11,63],"challenge":[12],"in":[13,28,111],"and":[15,69,73],"security":[16,77,127],"management.":[17],"In":[18,56],"particular,":[19],"managers":[21],"require":[22],"concise":[23],"reports":[24],"about":[25],"significant":[26,47],"changes":[27,110,149],"their":[29],"traffic.":[31],"While":[32],"most":[33,148],"existing":[34],"techniques":[35],"focus":[36,60],"on":[37,61],"summarizing":[38],"a":[39,71,159],"single":[40],"dataset,":[42],"problem":[44],"finding":[46,62],"differences":[48,64],"between":[49,65],"multiple":[50],"datasets":[51],"open":[54],"challenge.":[55],"this":[57],"paper,":[58],"we":[59],"datasets,":[68],"preparing":[70],"summarized":[72],"interpretable":[74],"report":[75],"for":[76,126],"managers.":[78,128],"We":[79,99,114],"propose":[80,116],"use":[82],"contrast":[84,102],"pattern":[85],"mining,":[86],"which":[87],"finds":[88],"patterns":[89,103,125,144],"whose":[90],"support":[91],"differs":[92],"significantly":[93],"one":[95],"dataset":[96],"to":[97],"another.":[98],"show":[100,132],"that":[101,120,133],"are":[104,145,150],"highly":[105],"effective":[106],"at":[107],"extracting":[108],"meaningful":[109],"data.":[113],"also":[115],"several":[117],"evaluation":[118],"metrics":[119],"reflect":[121],"interpretability":[123],"Our":[129],"experimental":[130],"results":[131],"with":[134],"proposed":[136],"unsupervised":[137],"approach,":[138],"vast":[140],"majority":[141],"extracted":[143],"pure,":[146],"i.e.,":[147],"either":[151],"attack":[152],"or":[154],"normal":[155],"traffic,":[156],"but":[157],"not":[158],"mixture":[160],"both.":[162]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
