{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:05:49Z","timestamp":1742965549818,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030172763"},{"type":"electronic","value":"9783030172770"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-17277-0_5","type":"book-chapter","created":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T09:55:51Z","timestamp":1556099751000},"page":"82-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Simulating User Activity for Assessing Effect of Sampling on DB Activity Monitoring Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Hagit","family":"Grushka-Cohen","sequence":"first","affiliation":[]},{"given":"Ofer","family":"Biller","sequence":"additional","affiliation":[]},{"given":"Oded","family":"Sofer","sequence":"additional","affiliation":[]},{"given":"Lior","family":"Rokach","sequence":"additional","affiliation":[]},{"given":"Bracha","family":"Shapira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,25]]},"reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Feldman, D., Schmidt, M., Sohler, C.: Turning big data into tiny data: constant-size coresets for k-means, PCA and projective clustering. In: Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1434\u20131453. Society for Industrial and Applied Mathematics (2013)","DOI":"10.1137\/1.9781611973105.103"},{"key":"5_CR3","unstructured":"Grushka-Cohen, H., Sofer, O., Biller, O., Dymshits, M., Rokach, L., Shapira, B.: Sampling high throughput data for anomaly detection of data-base activity. arXiv preprint \n                      arXiv:1708.04278\n                      \n                     (2017)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Grushka-Cohen, H., Sofer, O., Biller, O., Shapira, B., Rokach, L.: CyberRank: knowledge elicitation for risk assessment of database security. In: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, pp. 2009\u20132012. ACM (2016)","DOI":"10.1145\/2983323.2983896"},{"issue":"9","key":"5_CR5","first-page":"512","volume":"10","author":"Z Jadidi","year":"2015","unstructured":"Jadidi, Z., Muthukkumarasamy, V., Sithirasenan, E., Singh, K.: Performance of flow-based anomaly detection in sampled traffic. J. Netw. 10(9), 512 (2015)","journal-title":"J. Netw."},{"issue":"01","key":"5_CR6","first-page":"16","volume":"11","author":"Z Jadidi","year":"2016","unstructured":"Jadidi, Z., Muthukkumarasamy, V., Sithirasenan, E., Singh, K.: Intelligent sampling using an optimized neural network. J. Netw. 11(01), 16\u201327 (2016)","journal-title":"J. Netw."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Juba, B., Musco, C., Long, F., Sidiroglou-Douskos, S., Rinard, M.C.: Principled sampling for anomaly detection. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23268"},{"key":"5_CR8","unstructured":"Kaplan, J., Sharma, S., Weinberg, A.: Meeting the cybersecurity challenge. Digit, McKinsey Google Scholar (2011)"},{"issue":"4","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., Kim, S.: A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst. Appl. 41(4), 1690\u20131700 (2014)","journal-title":"Expert Syst. Appl."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, A., Xu, J.J.: Sketch guided sampling-using on-line estimates of flow size for adaptive data collection. In: INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.326"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Mai, J., Chuah, C.N., Sridharan, A., Ye, T., Zang, H.: Is sampled data sufficient for anomaly detection? In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 165\u2013176. ACM (2006)","DOI":"10.1145\/1177080.1177102"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/JSYST.2015.2487221","volume":"11","author":"A Sallam","year":"2017","unstructured":"Sallam, A., Bertino, E., Hussain, S.R., Landers, D., Lefler, R.M., Steiner, D.: DBSAFE - an anomaly detection system to protect databases from exfiltration attempts. IEEE Syst. J. 11(2), 483\u2013493 (2017)","journal-title":"IEEE Syst. J."}],"container-title":["Lecture Notes in Computer Science","Policy-Based Autonomic Data Governance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17277-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T09:45:45Z","timestamp":1558345545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17277-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030172763","9783030172770"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17277-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}