{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:34:52Z","timestamp":1725993292798},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030009151"},{"type":"electronic","value":"9783030009168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00916-8_11","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T03:45:33Z","timestamp":1537847133000},"page":"109-119","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Human-Machine Collaborative Detection Model for Identifying Web Attacks"],"prefix":"10.1007","author":[{"given":"Yong","family":"Hu","sequence":"first","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weijing","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Guiqin","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Veeramachaneni, K., Arnaldo, I., Korrapati, V., Bassias, C., Li, K.: $${AI}^2$$: training a big data machine to defend. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 49\u201354. IEEE (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 251\u2013261. ACM (2003)","DOI":"10.1145\/948109.948144"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11599371_9","volume-title":"Cryptology and Network Security","author":"W Lu","year":"2005","unstructured":"Lu, W., Traore, I.: A new unsupervised anomaly detection framework for detecting network attacks in real-time. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 96\u2013109. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11599371_9"},{"issue":"18","key":"11_CR4","doi-asserted-by":"publisher","first-page":"3799","DOI":"10.1016\/j.ins.2007.03.025","volume":"177","author":"T Shon","year":"2007","unstructured":"Shon, T., Moon, J., Waterman, M.S.: A hybrid machine learning approach to network anomaly detection. Inf. Sci. 177(18), 3799\u20133821 (2007)","journal-title":"Inf. Sci."},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/B978-1-55860-335-6.50026-X","volume-title":"Machine Learning Proceedings 1994","author":"David D. Lewis","year":"1994","unstructured":"Lewis, D.D., Catlett, J.: Heterogeneous uncertainty sampling for supervised learning. In: Proceedings of the Eleventh International Conference on Machine Learning, pp. 148\u2013156 (1994)"},{"issue":"12","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TPDS.2007.1111","volume":"18","author":"Y Chen","year":"2007","unstructured":"Chen, Y., Hwang, K., Ku, W.S.: Collaborative detection of DDoS attacks over multiple network domains. IEEE Trans. Parallel Distrib. Syst. 18(12), 1649\u20131662 (2007)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1016\/j.jpdc.2006.04.007","volume":"66","author":"Y Chen","year":"2006","unstructured":"Chen, Y., Hwang, K.: Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. J. Parallel Distrib. Comput. 66(9), 1137\u20131151 (2006)","journal-title":"J. Parallel Distrib. Comput."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Yao, D., Yin, M., Luo, J., Zhang, S.: Network anomaly detection using random forests and entropy of traffic features. In: 2012 Fourth International Conference on Multimedia Information Networking and Security, pp. 926\u2013929. IEEE (2012)","DOI":"10.1109\/MINES.2012.146"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, J., Chen, C., Xiang, Y., Zhou, W.: Robust network traffic identification with unknown applications. In: Proceedings of the 8th ACM SIGSAC symposium on Information, Computer and Communications Security, pp. 405\u2013414. ACM (2012)","DOI":"10.1145\/2484313.2484366"},{"issue":"1","key":"11_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.eij.2013.10.003","volume":"15","author":"G Nadiammai","year":"2014","unstructured":"Nadiammai, G., Hemalatha, M.: Effective approach toward intrusion detection system using data mining techniques. Egypt. Inform. Journal. 15(1), 37\u201357 (2014)","journal-title":"Egypt. Inform. Journal."},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Ektefa, M., Memar, S., Sidi, F., Affendey, L.S.: Intrusion detection using data mining techniques. In: 2010 International Conference on Information Retrieval and Knowledge Management (CAMP), pp. 200\u2013203. IEEE (2010)","DOI":"10.1109\/INFRKM.2010.5466919"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Threepak, T., Watcharapupong, A., Assent, I. Web attack detection using entropy-based analysis. In: The International Conference on Information Networking 2014 (ICOIN 2014), pp. 244\u2013247. IEEE (2014)","DOI":"10.1109\/ICOIN.2014.6799699"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00916-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:16:55Z","timestamp":1571933815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00916-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009151","9783030009168"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00916-8_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}