{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T13:58:59Z","timestamp":1762351139058,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427865"},{"type":"electronic","value":"9783540455080"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45508-6_21","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T17:42:55Z","timestamp":1186422175000},"page":"241-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Architecture of Generalized Network Service Anomaly and Fault Thresholds"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Constantine","family":"Manikopoulos","sequence":"additional","affiliation":[]},{"given":"Jay","family":"Jorgenson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,10]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Joao B.D. Cabrera, B. Bavichandran, R.K. Mehra, \u201cStatistical Traffic Modeling for Network Intrusion Detection\u201d, Proceedings of 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication systems, Aug. 2000, pp. 466\u2013473.","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/26.380064","volume":"43","author":"N. Dawes","year":"1995","unstructured":"N. Dawes, J. Altoft, and B. Pagurek, \u201cNetwork Diagnosis by Reasoning in Uncertain Nested Evidence Spaces\u201d, IEEE Trans. Commun., vol. 43, 1995, pp. 466.","journal-title":"IEEE Trans. Commun."},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/49.842990","volume":"18","author":"L.L. Ho","year":"2000","unstructured":"L.L. Ho, D.J. Cavuto, S. Papavassiliou, A.G. Zawadzki, \u201cAdaptive and Automated Detection of Service Anomalies in Transaction-oriented WANs: Network Analysis, Algorithms, Implementation, and Deployment\u201d, IEEE Journal on Selected Areas in Commun., vol. 18, May 2000, pp. 744\u2013757.","journal-title":"IEEE Journal on Selected Areas in Commun."},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/72.595879","volume":"8","author":"J.R. Dorronsoro","year":"1997","unstructured":"J.R. Dorronsoro, F. Ginel, and C. Sanchez, \u201cNeural fraud Detection in Credit Card Operations\u201d, IEEE Trans. Neural Networks, vol. 8, 1997, pp. 827.","journal-title":"IEEE Trans. Neural Networks"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/24.58721","volume":"39","author":"R. Maxion","year":"1990","unstructured":"R. Maxion and F.E. Feather, \u201cA Case Study of Ethernet in a Distributed Computing Environment\u201d, IEEE Trans. Reliability, vol. 39, Oct. 1990, pp. 433\u2013443.","journal-title":"IEEE Trans. Reliability"},{"key":"21_CR6","unstructured":"S. Jiang, D. Siboni, A.A. Rhissa, G. Beuchot, \u201cAn Intelligent and Integrated System of Network Fault Management: Artificial Intelligence Technologies and Hybrid Architectures\u201d, Proceedings of IEEE Singapore International Conference on Networks, July 1995, pp. 265\u2013268."},{"key":"21_CR7","unstructured":"A. Valdes, D. Anderson, \u201cStatistical Methods for Computer Usage Anomaly Detection Using NIDES\u201d, Technical report SRI International, January 1995."},{"key":"21_CR8","unstructured":"H. S. Javitz, A. Valdes, \u201cThe NIDES Statistical Component: Description and Justification\u201d, Technical report SRI International, March 1993."},{"issue":"Issue 10","key":"21_CR9","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1049\/el:19910517","volume":"27","author":"R. M. Dillon","year":"1991","unstructured":"R. M. Dillon, C. N. Manikopoulos, \u201cNeural Net Nonlinear Prediction for Speech Data\u201d, IEEE Electronics Letters, Vol. 27, Issue 10, May 1991, pp. 824\u2013826.","journal-title":"IEEE Electronics Letters"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"A.K. Ghosh, J. Wanken, F. Charron, \u201cDetecting Anomalous and Unknown Intrusions Against Programs\u201d, Proceedings of IEEE 14th Annual Computer Security Applications Conference 1998, pp. 259-267.","DOI":"10.21236\/ADA329518"},{"key":"21_CR11","unstructured":"Simon Haykin, Neural Network A Comprehensive Foundation, Macmillan College Publishing Company, 1994."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"G.A. Carpenter, et al, \u201cFuzzy ARTMAP: An adaptive resonance architecture for incremental learning of analog maps\u201d, International Joint Conference on Neural Networks, June 1992.","DOI":"10.1109\/72.159059"},{"key":"21_CR13","unstructured":"NeuraWare Inc., Neural Computing A Technology Handbook for NeuralWorks Professional II\/PLUS and Neural Works Explorer, NeuralWare Inc., 1998."}],"container-title":["Lecture Notes in Computer Science","Management of Multimedia on the Internet"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45508-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:37:17Z","timestamp":1737347837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45508-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427865","9783540455080"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45508-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"10 October 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}