$ python3 list_field.py v2_papers/ analysis_method.anomaly_detection --papers False;Zhang, Jun 2012, "Unsupervised traffic classification using flow statistical properties and IP packet payload"|Bujlow, Tomasz 2012, "A method for classification of network traffic based on C5.0 Machine Learning Algorithm"|Moore, Andrew W. 2005, "Internet Traffic Classification Using Bayesian Analysis Techniques"|Gharaee, Hossein 2016, "A new feature selection IDS based on genetic algorithm and SVM"|Nguyen, Thuy 2012, "Timely and Continuous Machine-Learning-Based Classification for Interactive IP Traffic"|Williams, Nigel 2006, "a preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification"|Zhani, Mohamed Faten 2009, "Analysis and Prediction of Real Network Traffic"|Catania, Carlos A 2012, "An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection"|Dainotti, Alberto 2008, "Classification of Network Traffic via Packet-Level Hidden Markov Models"|Ambusaidi, Mohammed A. 2016, "Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm"|Gu, Guofei 2008, "BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection"|Zhang, Jun 2013, "Network Traffic Classification Using Correlation Information"|Javaid, Ahmad 2016, "A Deep Learning Approach for Network Intrusion Detection System"|Jadidi, Zahra 2013, "Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm"|Zhang, Hongli 2012, "Feature selection for optimizing traffic classification"|Auld, Tom 2007, "Bayesian Neural Networks for Internet Traffic Classification"|Taylor, Vincent F 2017, "Robust Smartphone App Identification Via Encrypted Network Traffic Analysis"|wright, charles 2006, "on inferring application protocol behaviors in encrypted network traffic"|Alshammari, Riyad 2009, "Machine Learning Based Encrypted Traffic Classification: Identifying SSH and Skype"|Erman, Jeffrey 2007, "Identifying and Discriminating Between Web and Peer-to-Peer Traffic in the Network Core"|Este, Alice 2009, "Support vector Machines for TCP traffic classification"|Yin, ChengGuo 2012, "Network traffic classification via HMM under the guidance of syntactic structure"|Mishra, Preeti 2016, "NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment"|Shrivastav, Amita 2010, "Network Traffic Classification using Semi-Supervised Approach"|Zhang, Jun 2013, "An Effective Network Traffic Classification Method with Unknown Flow Detection"|Dewaele, Guillaume 2010, "Unsupervised host behavior classification from connection patterns"|Karagiannis, Thomas 2005, "BLINC: Multilevel Traffic Classification in the Dark"|Yang, Ai-min 2008, "A P2P Network Traffic Classification Method Using SVM"|Ashfaq, Rana Aamir Raza 2017, "Fuzziness based semi-supervised learning approach for intrusion detection system"|Crotti, Manuel 2007, "Traffic Classification through Simple Statistical Fingerprinting"|Liu, Yingqiu 2007, "Network Traffic Classification Using K-means Clustering"|Jin, Yu 2012, "A Modular Machine Learning System for Flow-Level Traffic Classification in Large Networks"|Erman, Jeffrey 2007, "Offline/realtime traffic classification using semi-supervised learning"|Zhao, Jing-jing 2008, "Real-time feature selection in traffic classification"|Ringberg, Haakon 2007, "Sensitivity of PCA for traffic anomaly detection" True;Mirsky, Yisroel 2018, "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection"|Iglesias, Félix 2017, "pattern discovery in internet background radiation"|Huang, Shin-Ying 2013, "Network forensic analysis using growing hierarchical SOM"|Zhang, Jun 2015, "Robust network traffic classification"|Barford, Paul 2002, "A Signal Analysis of Network Traffic Anomalies"|Fiore, Ugo 2013, "Network anomaly detection with the restricted Boltzmann machine"|Gu, Yu 2005, "Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation"|Ma, Xinlei 2014, "DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy"|Thottan, Marina 2005, "Anomaly Detection in IP Networks"|Lakhina, Anukool 2005, "Mining Anomalies Using Traffic Feature Distributions"|Zeidanloo, Hoessein Rouhani 2010, "Botnet Detection Based on Traffic Monitoring"|Agarwal, Basant 2012, "Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques"|Iglesias, Félix 2016, "time-activity footprints in ip traffic"|Nychis, George 2008, "An empirical evaluation of entropy-based traffic anomaly detection"