{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:06:51Z","timestamp":1725552411232},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540311584"},{"type":"electronic","value":"9783540324355"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11610496_114","type":"book-chapter","created":{"date-parts":[[2005,12,21]],"date-time":"2005-12-21T07:10:24Z","timestamp":1135149024000},"page":"835-841","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers"],"prefix":"10.1007","author":[{"given":"Wu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiao-Chun","family":"Yun","sequence":"additional","affiliation":[]},{"given":"Jian-Hua","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"114_CR1","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"2","author":"K. Illgun","year":"1995","unstructured":"Illgun, K., Kemmerer, R., Philips, A.: State Transition Analysis: A Rule-based Intrusion Detection Approach. IEEE Transactions on Software Engineering\u00a02, 181\u2013199 (1995)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"114_CR2","first-page":"386","volume-title":"Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"S. Karlton","year":"2002","unstructured":"Karlton, S., Mohammed, Z.: ADMIT: Anomaly-based Data Mining for Intrusions. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 386\u2013395. ACM Press, Edmonton (2002)"},{"key":"114_CR3","unstructured":"Anderson, J.P., et al.: Detecting Unusual Program Behavior Using the Statistical Components of NIDES (1995), http:\/\/www.sdl.sri.com\/papers\/5sri\/5sri.pdf"},{"key":"114_CR4","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, pp. 240\u2013251 (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"114_CR5","doi-asserted-by":"crossref","unstructured":"Taylor, C., Foss, J.A.: NATE: Network Analysis of Anomalous Traffic Events, A Low-cost Approach. In: Proceedings of New Security Paradigms Workshop, New Mexico, USA, pp. 89\u201396 (2002)","DOI":"10.1145\/508171.508186"},{"key":"114_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V. Vapnik","year":"1995","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, New York (1995)"},{"key":"114_CR7","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janowski, G., Sung, A.H.: Intrusion Detection Using Neural Networks and Support Vector Machines. In: Proceedings of the IEEE International Joint Conference on Neural Networks, Hawaii, pp. 1702\u20131707 (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"114_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"1","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Buzo, A., Gray, R.: An Algorithm for Vector Quantizer Design. IEEE Transactions on Communications\u00a01, 84\u201396 (1980)","journal-title":"IEEE Transactions on Communications"},{"key":"114_CR9","first-page":"1513","volume":"7","author":"J.S. Pan","year":"2000","unstructured":"Pan, J.S., Lu, Z.M., Sun, S.H.: Vector Quantization Based on Genetic Simulated Annealing. Signal Processing\u00a07, 1513\u20131524 (2000)","journal-title":"Signal Processing"},{"key":"114_CR10","volume-title":"Advances in Kernel Methods-Support Vector Learning","author":"J. Platt","year":"1999","unstructured":"Platt, J.: Fast Training of Support Vector Machines using Sequential Minimal Optimization. In: Advances in Kernel Methods-Support Vector Learning. MIT Press, Cambridge (1999)"},{"key":"114_CR11","first-page":"530","volume":"5","author":"J.Y. Yang","year":"2003","unstructured":"Yang, J.Y., Wei, X.G., et al.: A Fast SVM Learning Algorithm. Journal of Nanjing University of Science and Technology\u00a05, 530\u2013536 (2003)","journal-title":"Journal of Nanjing University of Science and Technology"},{"key":"114_CR12","unstructured":"Zhang, X.: Using Class-center Vectors to Build Support Vector Machine. In: Proceedings of the 1999 IEEE Signal Processing Society Workshop, New York, pp. 3\u201311 (1999)"},{"key":"114_CR13","unstructured":"KDD CUP 1999 (1999), http:\/\/kdd.ics.uci.edu\/database\/kddcup99\/kddcup99.html"}],"container-title":["Lecture Notes in Computer Science","Advanced Web and Network Technologies, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11610496_114.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:08:14Z","timestamp":1619492894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11610496_114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540311584","9783540324355"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11610496_114","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}