{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:23:00Z","timestamp":1725560580253},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540281023"},{"type":"electronic","value":"9783540318682"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11534310_86","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T09:48:30Z","timestamp":1127814510000},"page":"817-825","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Hong-Wei","family":"Sun","sequence":"first","affiliation":[]},{"given":"Kwok-Yan","family":"Lam","sequence":"additional","affiliation":[]},{"given":"Siu-Leung","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jia-Guang","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"86_CR1","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion Detection Model. IEEE Transactions on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"86_CR2","doi-asserted-by":"crossref","unstructured":"Kemmerer, R.A., Vigna, G.: Intrusion Detection: A Brief History and Overiew. Security & Privacy, 27\u201330 (2002)","DOI":"10.1109\/MC.2002.1012428"},{"key":"86_CR3","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1016\/S0167-4048(01)00806-9","volume":"20","author":"E. Biermann","year":"2001","unstructured":"Biermann, E., Cloete, E., Venter, L.M.: A Comparison of Intrusion Detection System. Computers & Security\u00a020, 676\u2013683 (2001)","journal-title":"Computers & Security"},{"key":"86_CR4","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T. Verwoerd","year":"2002","unstructured":"Verwoerd, T., Hunt, R.: Intrusion Detection Techniques and Approaches. Computer Communications\u00a025, 1356\u20131365 (2002)","journal-title":"Computer Communications"},{"key":"86_CR5","doi-asserted-by":"crossref","unstructured":"Lindqvist, U., Porras, P.A.: Detecting Computer and Network Misuse through the Production-based Expert System Toolset. In: Proc. IEEE Symp. Security Privacy, pp. 146\u2013161 (1999)","DOI":"10.1109\/SECPRI.1999.766911"},{"key":"86_CR6","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: A Data Mining Framework for Building Intrusion Detection Models. In: Proc. IEEE Symp. Security Privacy, pp. 120\u2013132 (1999)"},{"issue":"4","key":"86_CR7","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/3468.935043","volume":"31","author":"N. Ye","year":"2001","unstructured":"Ye, N., Li, X., Chen, Q., Xu, M.M.: Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans\u00a031(4), 266\u2013274 (2001)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans"},{"issue":"7","key":"86_CR8","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TC.2002.1017701","volume":"51","author":"N. Ye","year":"2002","unstructured":"Ye, N., Emran, S.M., Chen, Q., Vilbert, S.: Multivariate Statistical Analysis of Audit Trails for Host-based Intrusion Detection. IEEE Transactions on Computers\u00a051(7), 810\u2013820 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"86_CR9","unstructured":"Javitz, H.S., Valdes, A.: The NIDES Statistical Component Description and Justification., Technical Report A010, Menlo Park, Calif: SRI Int\u2019l (1994)"},{"key":"86_CR10","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0164-1212(94)00103-0","volume":"31","author":"K.Y. Lam","year":"1995","unstructured":"Lam, K.Y., Hui, L., Chung, S.L.: Multivariate Data Analysis Software for Enhancing System Security. Journal of Systems Software\u00a031, 267\u2013275 (1995)","journal-title":"Journal of Systems Software"},{"key":"86_CR11","doi-asserted-by":"crossref","unstructured":"Shah, H., Undercoffer, J., Joshi, A.: Fuzzy Clustering for Intrusion Detection. In: Proc. of the 12\n                    th\n                   IEEE International Conference on Fuzzy Systems, vol.\u00a02, pp. 1274\u20131278 (2003)","DOI":"10.1109\/FUZZ.2003.1206614"},{"key":"86_CR12","doi-asserted-by":"crossref","unstructured":"Guan, Y., Ghorbani, A.A., Belacel, N.: Y-Means: A Clustering Method for Intrusion Detection. In: Proc. of 2003 Canadian Conference on Electrical and Computer Engineering, vol.\u00a02, pp. 1083\u20131086 (2003)","DOI":"10.1109\/CCECE.2003.1226084"},{"key":"86_CR13","doi-asserted-by":"crossref","unstructured":"Sun, H.W., Lam, K.Y., Chung, S.L., Gu, M., Sun, J.G.: Anomaly Detection in Grid Computing Based on Vector Quantization. In: Proc. of the 3\n                    rd\n                   International Conference on Grid and Cooperative Computing, pp. 883\u2013886 (2004)","DOI":"10.1007\/978-3-540-30208-7_129"},{"issue":"1","key":"86_CR14","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Buzo, A., Gray, R.M.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications\u00a028(1), 84\u201395 (1980)","journal-title":"IEEE Transactions on Communications"},{"key":"86_CR15","unstructured":"Endler, D.: Intrusion Detection using Solaris\u2019 Basic Security Module, at \n                    \n                      http:\/\/www.securityfocus.com\/focus\/ids\/articles\/idsbsm.html"}],"container-title":["Lecture Notes in Computer Science","Networking and Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11534310_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T02:51:48Z","timestamp":1619491908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11534310_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281023","9783540318682"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11534310_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}