{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:28:28Z","timestamp":1725481708262},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540676027"},{"type":"electronic","value":"9783540451648"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45164-1_15","type":"book-chapter","created":{"date-parts":[[2007,3,5]],"date-time":"2007-03-05T16:42:19Z","timestamp":1173112939000},"page":"142-154","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["A Multiple Model Cost-Sensitive Approach for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Wei","family":"Fan","sequence":"first","affiliation":[]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Salvatore J.","family":"Stolfo","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Miller","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,1,14]]},"reference":[{"key":"15_CR1","unstructured":"P. Chan and S. Stolfo. Towards scalable learning with non-uniform class and cost distribution: A case study in credit card fraud detection. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), August 1999. 151"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"W. W. Cohen. Fast effective rule induction. In Proceedings of the Twelfth International Conference on Machine Learning, pages 115\u2013123, Lake Taho, CA, 1995. Morgan Kaufmann. 145","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"P. Domingos. MetaCost: A general method for making classifiers cost-sensitive. In Proc. of the Fifth ACM SIGKDD Int\u2019l. Conf. on Knowledge Discovery & Data Mining, pages 155\u2013164, San Diego, CA, 1999. ACM. 143, 147","DOI":"10.1145\/312129.312220"},{"key":"15_CR4","unstructured":"W. Fan, S. Stolfo, J. X. Zhang, and P. K. Chan. Adacost: misclassification cost-sensitive learning. In Proceedings of the Sixteenth International Conference on Machine Learning, pages 97\u2013105, Bled, Slovenia, 1999. Morgan Kaufmann. 152"},{"key":"15_CR5","unstructured":"V. Jacobson, C. Leres, and S. McCanne. tcpdump. available via anonymous ftp to ftp.ee.lbl.gov, June 1989. 143"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"N. Lavrac, D. Gamberger, and P. Turney. Cost-sensitive feature reduction applied to a hybrid genetic algorithm. In Proceedings of the Seventh International Workshop on Algorithmic Learning Theory, pages 127\u2013134, Sydney, Australia, 1996. 152","DOI":"10.1007\/3-540-61863-5_40"},{"key":"15_CR7","unstructured":"W. Lee. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. PhD thesis, Columbia University, June 1999. 142, 143"},{"key":"15_CR8","unstructured":"W. Lee, M. Miller, and S. Stolfo et al. Toward cost-sensitive modeling for intrusion detection. Technical Report CUCS-002-00, Computer Science, Columbia University, 2000. 144, 151"},{"key":"15_CR9","unstructured":"M. Miller. Learning cost-senstitive classification rules for network intrusion detection using ripper. Technical Report CUCS-035-99, Computer Science Department, Columbia University, December 1999. 151"},{"key":"15_CR10","unstructured":"Network Flight Recorder Inc. Network flight recorder. \n                    http:\/\/www.nfr.com\/\n                    \n                  , 1997. 145"},{"key":"15_CR11","unstructured":"University of California at Irvine. UCI KDD archive. \n                    http:\/\/kdd.ics.uci.edu\/\n                    \n                  . 147"},{"key":"15_CR12","unstructured":"V. Paxson. Bro: A system for detecting network intruders in real-time. In Proc. of the Seventh USENIX Security Symposium, San Antonion, TX, 1998. 153"},{"key":"15_CR13","unstructured":"P. Turney. Cost-sensitive learning bibliographies. \n                    http:\/\/ai.iit.nrc.ca\/bibiographies\/cost-sensitive.html\n                    \n                  . 151"}],"container-title":["Lecture Notes in Computer Science","Machine Learning: ECML 2000"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45164-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:26:07Z","timestamp":1558272367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45164-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540676027","9783540451648"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45164-1_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]},"assertion":[{"value":"14 January 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}