{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:54:56Z","timestamp":1761807296772},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540459163"},{"type":"electronic","value":"9783540459170"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11881599_134","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T06:05:25Z","timestamp":1158905125000},"page":"1082-1091","source":"Crossref","is-referenced-by-count":9,"title":["Clustering and Classification Based Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Hongyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"134_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 203\u2013222. Springer, Heidelberg (2004)"},{"key":"134_CR2","unstructured":"Roesch, M.: Snort: The open source network intrusion detection system (2005), http:\/\/snort.sourcefire.com\/"},{"issue":"1\/2","key":"134_CR3","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","volume":"10","author":"Stanifor","year":"2002","unstructured":"Stanifor, Hoagland, McAlerney: Practical Automated Detection of Stealthy PortScans. Journal of Computer Security\u00a010(1\/2), 105\u2013136 (2002)","journal-title":"Journal of Computer Security"},{"key":"134_CR4","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic. Technical report, Florida Tech., technical report CS-2001-4 (April 2001)","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"134_CR5","doi-asserted-by":"crossref","unstructured":"Mahoney, M.: Network Traffic Anomaly Detection Based on Packet Bytes. In: Proc. ACM. Symposium on Applied Computing, pp. 346\u2013350 (2003)","DOI":"10.1145\/952532.952601"},{"issue":"4","key":"134_CR6","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"134_CR7","doi-asserted-by":"crossref","unstructured":"Barbara, D., Couto, J., Jajodia, S., Wu, N.: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Record, 15\u201324 (2001)","DOI":"10.1145\/604264.604268"},{"key":"134_CR8","unstructured":"Ertoz, L., Eilertson, E., et al.: The MINDS - Minnesota Intrusion Detection System. In: Workshop on Next Generation Data Mining, MIT \/AAAI Press (2004)"},{"issue":"2","key":"134_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/846183.846200","volume":"1","author":"B. Pfahringer","year":"2000","unstructured":"Pfahringer, B.: Winning the KDD99 Classification Cup: Bagged Boosting. SIGKDD explorations\u00a01(2), 65\u201366 (2000)","journal-title":"SIGKDD explorations"},{"key":"134_CR10","doi-asserted-by":"crossref","unstructured":"Agarwal, R., Joshi, M.V.: PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection). Technical Report TR 00-015, Department of Computer Science, University of Minnesota (2000)","DOI":"10.1137\/1.9781611972719.29"},{"key":"134_CR11","unstructured":"MacQueen: Some methods for classification and analysis of multivariate observations. In: Proc. 5th Berkeley Symp. Math. Statistics and Probability, pp. 281\u2013297 (1967)"},{"key":"134_CR12","unstructured":"Chan, P.K., Mahoney, M.V., Arshad, M.H.: A machine learning approach to anomaly detection. Technical Report, Department of Computer Science, Florida Institute of Technology (2003)"},{"key":"134_CR13","unstructured":"University of California, Irvine: KDD Cup 1999 Data (2005), http:\/\/www.ics.uci.edu\/~kdd\/databases\/kddcup99\/kddcup99.html"}],"container-title":["Lecture Notes in Computer Science","Fuzzy Systems and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11881599_134.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:51:00Z","timestamp":1605624660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11881599_134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540459163","9783540459170"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11881599_134","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}