{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:11:06Z","timestamp":1725487866713},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540140405"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-39205-x_110","type":"book-chapter","created":{"date-parts":[[2007,7,21]],"date-time":"2007-07-21T14:23:13Z","timestamp":1185027793000},"page":"652-659","source":"Crossref","is-referenced-by-count":0,"title":["Statistic Learning and Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Xian","family":"Rao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cun-xi","family":"Dong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shao-quan","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"110_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V. N.. Vapnik","year":"1995","unstructured":"Vapnik V. N.. The Nature of Statistical Learning Theory. New York: spring-Verlag, 1995."},{"issue":"2","key":"110_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning D.E. An Intrusion Detection Model. IEEE Trans. On Software Engineering, 1987, 13(2):222\u2013232.","journal-title":"IEEE Trans. On Software Engineering"},{"unstructured":"Humar G. Classification and detection of computer intrusions [ph.d.Thesis]. Purdue University, 1995","key":"110_CR3"},{"key":"110_CR4","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes C., Vapnik V. Support vector networks. Machine Learning, 1995(20):273\u2013297","journal-title":"Machine Learning"},{"doi-asserted-by":"crossref","unstructured":"Osuna E., Freand R., and Girosi F. Training Support Vector Machines:an Implication to face detection. IEEE Conference on Computer Vision and Pattern Recognition. 1997:130\u2013136","key":"110_CR5","DOI":"10.1109\/CVPR.1997.609310"}],"container-title":["Lecture Notes in Computer Science","Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39205-X_110.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:20:47Z","timestamp":1619558447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39205-X_110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540140405"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-39205-x_110","relation":{},"subject":[]}}