{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“讯息”:{“索引”:{“日期部分”:[[2024,2,26]],“日期时间”:“2024-02-26T18:02:57Z”,“时间戳”:1708970577585},“参考计数”:64,“出版商”:“电气与电子工程师学会(IEEE)”,“发行”:“10”,“许可证”:[{“开始”:{-“日期部分“:[2019,10,1]],”时间”:“2019-10-01T00:00:00Z”,“timestamp”:1569888000000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”},{“start”:{“date-parts”:[[2019,10,1]],“date-time”:“2019-10-01T00:00”,“时间戳”:15698 8800000},“:”stm-asf“,”delay-in-days“:0,”URL“:“https:\/\/doi.org\/10.15223\/policy-029”},{“start”:{“date-parts”:[[2019,10,1]],“date-time”:“2019-10-01T00:00:00Z”,“timestamp”:156988800000},“content-version”:“stm-asf”,“delay-in-days”:0,“URL”:“https:\/\/doi.org\/10.15223\/policy-037”}],“出资人”:[{“name”:“国家密钥R&中国D项目”,“奖项”:[“2018YFC0830500”]},{“doi”:“10.13039\/501100001809”,“name”:“国家自然科学基金”,“doi-asserted-by”:“publisher”,“adward”:[“U1301254”,“61603290”,“6.1602371”],“id”:[{“id”:“10.13029\/501000001808”,“id-type”:“doi”,“asserted-dby”:“publisher”}]},{“name”:“教育部和中国移动研究基金”,”“adward:[”MCM20160311“]}”,{doi“:”10.13039\/501100004608“,“name”:“江苏省自然科学基金”,“doi-asserted-by”:“publisher”,“award”:[“SBK2014021758”],“id”:[{“id”:“10.13039\/501100004608”,“id-type”:“doi”,“asserted-by”:“publisher”}]},{“name”:“111中国国际合作计划”}:“江苏省产学研联合创新基金前瞻性联合研究”,“奖项”:[“BY2014074”]},{“名称”:“深圳基础研究”,”奖项“:[”JCYJ20160229195940462“,”JCYJ101708100819428“]}:[“2015M582663”],“id”:[{“id”:“10.13039\/501100002858”,“id-type”:“DOI”,“asserted-by”:“publisher”}]},{“name”:“中国陕西省自然科学基础研究计划”,“奖项”:[“2016JQ6034”]}],“内容域”:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[”IEEE Trans.Knowl.Data Eng.“],“published-pre”int“:{”日期部分“:[[2019,10,1]]},“DOI”:“10.1109\/tkde.2018.2873319”,“类型”:“期刊文章”,“已创建”:{“日期部分”:[[2018,10,1]],“日期时间”:“2018-10-01T18:42:56Z”,“时间戳”:1538419376000},“页面”:“1912-1925”,“来源”:“Crossref”,“被计数引用”:7,“标题”:[“检测高速链接上的各种长期窃取用户行为”],“前缀”:“10.1109”,“卷”:“31”,“作者”:[{“ORCID”:“http://\/ORCID.org\/0000-0002-1434-837X”,“authenticated-ORCID”:false,“给定”:“平会”,“家族”:“王”,“序列”:“第一”,“从属关系”:[]},{“ORCID”:“http://\-ORCID.org\/00000-0003-2190-8934”,“authenticated-ORCID“:false”,“给定的”:“彭”,“家庭”:“贾”,“顺序”:“附加”,“附属关系”“:[]},{”给定“:”静“,”家庭“:“Tao”,“sequence”:“additional”,“affiliation”:[]},{“given”:“Xiaohong”,“family”:“Guan”,“serquence”:“additionable”,“filiation“:[]{”,“member”:“263”,“reference”:[{“key”:”ref39“,“doi-asserted-by”:”publisher“,”doi“10.1145 \/3050220.3063772”},“key“ref38”,“first page”“311”,“article-title”:“Flowrardar:A”数据中心更好的netflow”,“作者”:“li”,“年份”:“2016年”,“新闻标题”:“Proc 10th USENIX Conf Netw Syst Des Implementation”},{“key”:“ref33”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/129806.1298345”}、{“key”:”ref32“,”doi-assert-by“:”publisher“,”doi“:”10.1145\/1140277.1140295“},“key“ref31”,“首页”:“1”,“article-title”:“草图引导采样-使用对流量大小的在线估计进行自适应数据收集”,“作者”:“kumar”,“年份”:“2006”,“期刊标题”:“Proc 25th IEEE Int Conf Comput Commun”},{“key”:“ref30”,“doi断言者”:“publisher”,“doi”:“10.1145\/10642121.1064221”},{“key”:“ref37”,“doi断言者”:“publisher”,“doi”:“10.1145\/2785956.2787503”},{“key”:“ref36”,“first page”:“29”,“article-title”:“使用opensketch进行软件定义的流量测量”,“author”:“yu”,“year”:“2013”,“journal-title“:”Proc 10th USENIX Conf Netw Syst Des Implementation“},{“key”:”ref35“,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TIFS.2014.2312544”},“key“:”ref34“,”doi-assert-by“:”publisher“,“doi-”:“10.1109\/INFCOM.2009.5061991”},{“key”:“ref60”,“doi-asserted-by”:“publisher”,“doi”:“10.109\/SP.2006年12月”}:“ref63”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/INFCOMW.2012.6193518”},{“key”:“ref28”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1005686.1005709”},{“密钥”:“ref64”,“文章标题”:“虚拟索引方法:公共数据集”,“年份”:“0”}:“10.1145\/1452520.1452553”},{“键”:“参考2”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICNP.2014.33”},{“key”:“ref1”,“doi-asserted-by”:”crossref“,”first page“:”326“,”doi“:”10.1007\/978-3642-04342-0_17“,”article-title“利用时间持久性检测隐蔽僵尸网络通道”,“author”:“giroire”,”year“:”2009“,”journal-title:“第二届国际入侵检测研讨会最新进展”},{“key”:“ref20”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/INFCOM.2011.5935169”}{“key”:“ref24”,“doi-asserted-by”:“publisher”,“DOI”:“10.1109\/TNET.2007.896150”},{“key”:“ref23”,“DOI-asserted-by”:“publisher”,“DOI:”10.1145\/1061318.1061325{“key”:“ref50”,“首页”:“214”,“文章标题”:“挖掘时间相关数据库中的分段周期模式”,“author”:“han”,“year”:“1998”,“journal-title”:“Proc-Int-Conf-Knowl Discovery Data Mining”},{“key”:“ref51”,“first-page”:“106”:“Proc 15th Int Conf Data Eng”},{“key”:“ref59”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/2810103.2813654”},{“key”:“ref56”,“doi-asserted-by”:“publisher”,“DOI”:“10.1080\/01621459.1952.10483446”},{“key”:“ref55”,“DOI-asserted-by”:“publicher”,“DI:”10.1145\/362686.3692“},}“key:”ref54“,”DOI-assert-by“:”publisher“,”DOI“:”10.1109\/ICDM.2002.1184039“}/502512.502571“},{”key“:”ref52“,”DOI-asserted-by“:”publisher“,”DOI“:“10.1145\/347090.347150”},{“key”:“ref10”,“doi-asserted-by”:“publisher”,“doi”:“10.145\/2020408.2020579”}key“:”ref12“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/633025.633056“},{”key“:“ref13”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/863955.863972”}by“:”publisher“,”doi“:”10.1145\/1028788.1028802“},{”key“:”ref17“,”doi-asserted-by“:“publisher”,“DOI”:“10.1145\/1330107.1330117”},{“key”:“ref18”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1109\/INFCOM.2009.5061990“},}“key:”ref19“,”DOI-assert-by“:”publisher“,”DOI“:”10.1101109\/TIFS.2011.2123094“}“},{”key“:”ref3“,”DOI-asserted-by“:”publisher“,”DOI“:“10.1109\/SAINT-W.2007.14”},{“key”:“ref6”,“首页”:“1”,“article-title”:“网络攻击的幕后:网络攻击行为分析”,“author”:“canali”,“year”:“2013”,“journal-title“:“Proc Symp Netw Distribute Syst Security”}:“Jackstraves:从bot流量中选取命令和控制连接”,“author”:“jacob”,“year”:“2011”,“journal-title”:“Proc Usenix Security Symp”},{“key”:“ref8”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.ins.2017.04.033”}:“Botminer:针对协议和结构相关僵尸网络检测的网络流量聚类分析”,“author”:“gu”,“year”:“2008”,“journal-title”:“Proc 17th Conf Security Symp”},{“key”:“ref49”,“doi-asserted-by”:“publisher”,”doi“:”10.1109\/TKDE.2005.114 30_5英寸,“article-title”:“学习点击率的防欺诈点击方法”,“author”:“immorlica”,“year”:“2005”,“journal-title“:“Proc Workshop Internet Netw Econ”},{“key”:“ref46”,“first-page”:“370”,《article-title》:“时间序列数据库中的多周期性和部分周期性挖掘”,“author”:“berberetis”,“年份”:“2002”,“journal-ttitle”:“Proc 15th Eur Conf Artif Intell”},{“key”:“ref45”,“first page”::“363”,“article-title”:“使用草图识别大规模时间序列数据集中的代表性趋势”,“author”:“indyk”,“year”:“2000”,“journal-title“:”Proc 26th Int Conf Very Large data Bases“},}“key:”ref48“,”doi-asserted-by“:”publisher“,”doi“:”10.1109\/ICDM.2005.152“}”,{”key“:“ref47”,“doi-asserted-by”:“crossref”,“first page”:“653”,“doi”:“10.1007\/978-3-540-24775-3_77”,“article-title”:“Discovering partial periodic patterns in discrete data sequences”,“author”:“cao”,“year”:“2004”,“journal-title“:”Proc Pacific-Asia Conf Adv Knowledge Discovery data Mining“},{”key“:”ref42“,”doi-assert-by“:”publisher“,”doi“:“10.1109\/TIFS.2015.2503269”},{“key”:“ref41”,“doi-asserted-by”:“publisher”,“doi”:“10.14778\/3025111.3025112”}],“集装箱”:[“IEEE知识与数据工程学报”],“original-title”:[],“link”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx7\/69\/8832290\/084788354.pdf?arnumber=8478354”,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,7,13]],“date-time”:“2022-07-13T20:49:50Z”,“timestamp”:1657745390000},“score”:1,“resource”:{“primary”:{“URL”:“https:\/\/ieeexplore.iee.org\/document\/8478354”}},”subtitle“:[],”shorttitle“:[],”issued“:{”date-parts“:[2019,10,1]]},http://\/dx.doi.org\/10.109\/tkde.2018.2873319“,”关系“:{},”ISSN“:[“1041-4347”,“1558-2191”,“2326-3865”],“issn-type”:[{“value”:“1041-347”,“type”:“print”},{“value”:“1558-191”,“type”:“electronic”}