{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:36:51Z","timestamp":1725550611111},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540292272"},{"type":"electronic","value":"9783540320876"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11563952_30","type":"book-chapter","created":{"date-parts":[[2005,10,19]],"date-time":"2005-10-19T11:24:50Z","timestamp":1129721090000},"page":"333-344","source":"Crossref","is-referenced-by-count":6,"title":["Intrusion Detection of DoS\/DDoS and Probing Attacks for Web Services"],"prefix":"10.1007","author":[{"given":"Jun","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Ming-zeng","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Usenix Security Symposium, Washington, D.C., pp. 401\u2013414 (2001)","DOI":"10.21236\/ADA400003"},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1109\/18.720541","volume":"44","author":"R. Gray","year":"1998","unstructured":"Gray, R., Neuhoff, D.L.: Quantization. IEEE Transactions on Information Theory\u00a044, 2325\u20132384 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"30_CR3","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion-detection Model. IEEE Transactions on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"30_CR4","volume-title":"Applications of Data Mining in Computer Security","author":"E. Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M.: A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. Applications of Data Mining in Computer Security. Kluwer, Dordrecht (2002)"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: Proceedings of the 2003 Symposium on Applications and the Internet, pp. 119\u2013123 (2003)","DOI":"10.1109\/SAINT.2003.1183050"},{"issue":"13","key":"30_CR6","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1049\/el:20020467","volume":"38","author":"Y. Qiao","year":"2002","unstructured":"Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly Intrusion Detection Method Based on HMM. Electronics Letters\u00a038(13), 663\u2013664 (2002)","journal-title":"Electronics Letters"},{"key":"30_CR7","unstructured":"Bonifaco, J.M., Moreira, E.S.: An Adaptive Intrusion Detection System Using Neural Network. Research Report, UNESP, Brazil (1997)"},{"key":"30_CR8","unstructured":"http:\/\/www.snort.org"},{"issue":"1","key":"30_CR9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Buzo, A., Gray, R.M.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications\u00a028(1), 84\u201395 (1980)","journal-title":"IEEE Transactions on Communications"},{"issue":"8","key":"30_CR10","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1016\/0893-6080(94)90003-5","volume":"7","author":"N. Ueda","year":"1994","unstructured":"Ueda, N., Nakano, R.: A New Competitive Learning Approach Based on an Equidistortion Principle for Designing Optimal Vector Quantizers. IEEE Transactions on Neural Networks\u00a07(8), 1211\u20131227 (1994)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"30_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97966-8","volume-title":"Self-Organization Maps","author":"T. Kohonen","year":"1997","unstructured":"Kohonen, T.: Self-Organization Maps, 3rd edn. Springer, Berlin (1997)","edition":"3"},{"key":"30_CR12","volume-title":"Machine Learning","author":"T. Mitchell","year":"1997","unstructured":"Mitchell, T.: Machine Learning. McGraw Hill, New York (1997)"},{"key":"30_CR13","unstructured":"http:\/\/www.ll.mit.edu\/IST\/ideval\/index.html"},{"issue":"4","key":"30_CR14","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"1999","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks\u00a034(4), 579\u2013595 (1999)","journal-title":"Computer Networks"}],"container-title":["Lecture Notes in Computer Science","Advances in Web-Age Information Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11563952_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:14:50Z","timestamp":1619507690000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11563952_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540292272","9783540320876"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11563952_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}