{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:14:02Z","timestamp":1726060442652},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030364014"},{"type":"electronic","value":"9783030364021"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36402-1_27","type":"book-chapter","created":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T08:04:01Z","timestamp":1574928241000},"page":"254-262","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on the Classification Method of Network Abnormal Data"],"prefix":"10.1007","author":[{"given":"Bozhong","family":"Liu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,29]]},"reference":[{"issue":"14","key":"27_CR1","first-page":"23","volume":"23","author":"B Nemanja","year":"2017","unstructured":"Nemanja, B., Duan, K.Z.: Improved real-time data anomaly detection using context classification. Expert Syst. Appl. 23(14), 23\u201336 (2017)","journal-title":"Expert Syst. Appl."},{"key":"27_CR2","unstructured":"Sun, Y., Wong, A.C., Kamel, M.S.: Classification of imbalanced data: a review. Int. J. Pattern Recognit. Artif. Intell. 12(3), 501\u2013520 (2017)"},{"issue":"20","key":"27_CR3","doi-asserted-by":"publisher","first-page":"5255","DOI":"10.1109\/TSP.2018.2866847","volume":"66","author":"B Wang","year":"2018","unstructured":"Wang, B., Zhao, Y., Hu, F., et al.: Anomaly detection with subgraph search and vertex classification preprocessing in Chung-Lu random networks. IEEE Trans. Signal Process. 66(20), 5255\u20135268 (2018)","journal-title":"IEEE Trans. Signal Process."},{"issue":"5","key":"27_CR4","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1080\/18756891.2016.1237186","volume":"9","author":"J Hussain","year":"2016","unstructured":"Hussain, J., Lalmuanawma, S., Chhakchhuak, L.: A two-stage hybrid classification technique for network intrusion detection system. Int. J. Comput. Intell. Syst. 9(5), 863\u2013875 (2016)","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"1","key":"27_CR5","first-page":"124","volume":"18","author":"DU Xin","year":"2016","unstructured":"Xin, D.U., Huang, X., Hongga, L.I., et al.: Research on classification of plant community using projection pursuit learning network algorithm on high resolution remote sensing images. J. Geo-Inf. Sci. 18(1), 124\u2013132 (2016)","journal-title":"J. Geo-Inf. Sci."},{"key":"27_CR6","first-page":"1","volume":"2","author":"F Al-Obeidat","year":"2017","unstructured":"Al-Obeidat, F., El-Alfy, E.S.M.: Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols. Pers. Ubiquitous Comput. 2, 1\u201315 (2017)","journal-title":"Pers. Ubiquitous Comput."},{"key":"27_CR7","unstructured":"Nguyen, H.A., Choi, D.: Application of data mining to network intrusion detection: classifier selection model. Lecture Notes in Computer Science 36(12), 230\u2013241 (2017)"},{"key":"27_CR8","unstructured":"Pang, M., Hao, X.: Traffic flow prediction of chaos time series by using subtractive clustering for fuzzy neural network modeling. In: Second International Symposium on Intelligent Information Technology Application, vol. 2(13), pp. 12\u201326 (2017)"},{"issue":"6","key":"27_CR9","first-page":"1","volume":"28","author":"RB Jerome","year":"2016","unstructured":"Jerome, R.B., H\u00e4t\u00f6nen, K.: Anomaly detection and classification using a metric for determining the significance of failures. Neural Comput. Appl. 28(6), 1\u201311 (2016)","journal-title":"Neural Comput. Appl."},{"key":"27_CR10","unstructured":"Ying, W.: Wireless network traffic abnormal data information detection simulation. Comput. Simul. 34(9), 408\u2013411 (2017)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Advanced Hybrid Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36402-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T08:20:17Z","timestamp":1574929217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36402-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030364014","9783030364021"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36402-1_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADHIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Hybrid Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adhip2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adhip.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI compass","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"237","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"101","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}