LEADER 02149nam 2200373 450 001 996279883103316 005 20231206165425.0 010 $a1-5044-0514-5 024 7 $a10.1109/IEEESTD.1980.7445127 035 $a(CKB)3710000000627660 035 $a(NjHacI)993710000000627660 035 $a(EXLCZ)993710000000627660 100 $a20231206d1980 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aANSI/IEEE C57.12.00-1980 $eAmerican National Standard General Requirements for Liquid-Immersed Distribution, Power, and Regulating Transformers /$fIEEE 210 1$a[Place of publication not identified] :$cIEEE,$d1980. 215 $a1 online resource 330 $aThis standard is intended as a basis for the establishment of performance, limited electrical and mechanical interchangeability, and safety requirements of equipment described; and for assistance in the proper selection of such equipment. This standard describes electrical, mechanical, and safety requirements of liquid-immersed distribution and power transformers, and autotransformers and regulating transformers; single and polyphase, with voltage 601 V or higher in the highest voltage winding. This standard applies to all liquid-immersed distribution, power, and regulating transformers except as indicated below: (1) Instrument transformers. (2) Step-voltage and induction voltage regulators. (3) Arc furnace transformers. (4) Rectifier transformers. (5) Specialty transformers. (6) Grounding transformers. (7) Mobile transformers. (8) Mine transformers. When this standard is used on a mandatory basis, the words shall and must indicates mandatory requirements; and the words should and may. 517 $aANSI/IEEE C57.12.00-1980 606 $aElectric transformers 606 $aElectric current regulators 615 0$aElectric transformers. 615 0$aElectric current regulators. 676 $a621.314 801 0$bNjHacI 801 1$bNjHacl 906 $aDOCUMENT 912 $a996279883103316 996 $aANSI$92072434 997 $aUNISA LEADER 04682nam 22006015 450 001 9910743245403321 005 20251202143229.0 010 $a981-16-8324-7 010 $a981-16-8325-5 010 $a981-16-8325-5 024 7 $a10.1007/978-981-16-8325-1 035 $a(MiAaPQ)EBC6827684 035 $a(Au-PeEL)EBL6827684 035 $a(CKB)20151634200041 035 $a(OCoLC)1289368542 035 $a(PPN)259391123 035 $a(BIP)82050404 035 $a(DE-He213)978-981-16-8325-1 035 $a(EXLCZ)9920151634200041 100 $a20211215d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork Behavior Analysis $eMeasurement, Models, and Applications /$fby Kuai Xu 205 $a1st ed. 2022. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2022. 215 $a1 online resource (170 pages) 311 08$aPrint version: Xu, Kuai Network Behavior Analysis Singapore : Springer Singapore Pte. Limited,c2022 9789811683244 327 $aChapter 1: Introduction -- Chapter 2: Background of Network Behavior Modeling and Analysis -- Chapter 3: Behavior Modeling of Network Traffic -- Chapter 4: Structural Modeling of Network Traffic -- Chapter 5: Graphic Modeling of Network Traffic -- Chapter 6: Real-Time Network Behavior Analysis -- Chapter 7: Applications -- Chapter 8: Research Frontiers of Network Behavior Analysis. 330 $aThis book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet ?objects? such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks. The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections. The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications. 606 $aComputer networks 606 $aData mining 606 $aComputer science 606 $aComputer Communication Networks 606 $aData Mining and Knowledge Discovery 606 $aComputer Science 615 0$aComputer networks. 615 0$aData mining. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aData Mining and Knowledge Discovery. 615 24$aComputer Science. 676 $a004.678 700 $aXu$b Kuai$01080936 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910743245403321 996 $aNetwork behavior analysis$93558726 997 $aUNINA