{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:36:41Z","timestamp":1743097001397,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030510992"},{"type":"electronic","value":"9783030511005"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51100-5_30","type":"book-chapter","created":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T14:02:39Z","timestamp":1595080959000},"page":"338-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Network APT Attack Detection Based on Big Data Analysis"],"prefix":"10.1007","author":[{"given":"Guo-gen","family":"Fan","sequence":"first","affiliation":[]},{"given":"Jian-li","family":"Zhai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,19]]},"reference":[{"issue":"05","key":"30_CR1","first-page":"1113","volume":"56","author":"H Huang","year":"2018","unstructured":"Huang, H., Lu, D., T., H.: Chover type law of iterated logarithm of NSD sequences. J. Jilin Univ. 56(05), 1113\u20131118 (2018). Science Edition","journal-title":"J. Jilin Univ."},{"key":"30_CR2","first-page":"326","volume":"7","author":"X Li","year":"2018","unstructured":"Li, X., Kang, Z.: Ultra low Power and High Linear LNA based on double Cross Coupling Capacitance feedback. Autom. Instrum. 7, 326\u2013330 (2018)","journal-title":"Autom. Instrum."},{"issue":"3","key":"30_CR3","first-page":"315","volume":"13","author":"XF Houg","year":"2018","unstructured":"Houg, X.F., Wang, H., Li, Y.: Research on efficient processing method of large amount of data based on HIVE and distributed Cluster. J. China Acad. Electron. Inform. Technol. 13(3), 315\u2013320 (2018)","journal-title":"J. China Acad. Electron. Inform. Technol."},{"issue":"3","key":"30_CR4","first-page":"158","volume":"15","author":"LX Zhao","year":"2017","unstructured":"Zhao, L.X.: Research and implementation of vehicle-mounted Charger based on DSP. J. Power Supply 15(3), 158\u2013162 (2017)","journal-title":"J. Power Supply"},{"issue":"1","key":"30_CR5","first-page":"140","volume":"37","author":"HP Guo","year":"2016","unstructured":"Guo, H.P., Dong, Y.D., Mao, H.T., et al.: Logistic discrimination based rare-class classification method. J. Chin. Comput. Syst. 37(1), 140\u2013145 (2016)","journal-title":"J. Chin. Comput. Syst."},{"issue":"4","key":"30_CR6","first-page":"1197","volume":"35","author":"N Gao","year":"2018","unstructured":"Gao, N., He, Y.Y., Gao, L.: Deep learning method for intrusion detection in massive data. Appl. Res. Comput. 35(4), 1197\u20131200 (2018)","journal-title":"Appl. Res. Comput."},{"issue":"2","key":"30_CR7","first-page":"54","volume":"23","author":"YZ Zhang","year":"2014","unstructured":"Zhang, Y.Z., You, R.: Wavelet variance analysis of EEG based on window function. Chin. J. Biomed. Eng. 23(2), 54\u201359 (2014)","journal-title":"Chin. J. Biomed. Eng."},{"issue":"10","key":"30_CR8","first-page":"58","volume":"44","author":"L Yang","year":"2018","unstructured":"Yang, L., Kong, Z., Shi, H.: Multi-controller dynamic deployment strategy of software defined spatial information network. Comput. Eng. 44(10), 58\u201363 (2018)","journal-title":"Comput. Eng."},{"issue":"10","key":"30_CR9","first-page":"1128","volume":"39","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Du, Z., Zhao, Q.: Bifurcation analysis of the ENSO recharge oscillator with time-delayed feedback. Appl. Math. Mech. 39(10), 1128\u20131136 (2018)","journal-title":"Appl. Math. Mech."},{"issue":"10","key":"30_CR10","doi-asserted-by":"publisher","first-page":"2275","DOI":"10.1587\/transinf.2016INP0007","volume":"100","author":"W Niu","year":"2017","unstructured":"Niu, W., Zhang, X., Yang, G., et al.: Modeling attack process of advanced persistent threat using network evolution. IEICE Trans. Inf. Syst. 100(10), 2275\u20132286 (2017)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"7","key":"30_CR11","first-page":"1941","volume":"38","author":"X Shen","year":"2018","unstructured":"Shen, X., Qin, S.: Anomaly detection based on synthetic minority oversampling technique and deep belief network. J. Comput. Appl. 38(7), 1941\u20131945 (2018)","journal-title":"J. Comput. Appl."},{"issue":"5","key":"30_CR12","first-page":"1216","volume":"37","author":"YH Yang","year":"2014","unstructured":"Yang, Y.H., Huang, H.Z., Shen, Q.N., et al.: Research on intrusion detection based on incremental GHSOM. Chin. J. Comput. 37(5), 1216\u20131224 (2014)","journal-title":"Chin. J. Comput."},{"issue":"03","key":"30_CR13","first-page":"574","volume":"57","author":"L Liu","year":"2019","unstructured":"Liu, L., Liu, S.: Dynamic fuzzy clustering algorithm based on weight difference. J. Jilin Univ. 57(03), 574\u2013582 (2019). (Scientific version)","journal-title":"J. Jilin Univ."},{"issue":"4","key":"30_CR14","first-page":"978","volume":"38","author":"Y Ma","year":"2018","unstructured":"Ma, Y., Zhang, Z., Lin, C.: Research progress in similarity join query of big data. J. Comput. Appl. 38(4), 978\u2013986 (2018)","journal-title":"J. Comput. Appl."},{"issue":"10","key":"30_CR15","first-page":"1128","volume":"39","author":"Z Du","year":"2018","unstructured":"Du, Z., Zhao, Q.: Bifurcation analysis of the ENSO recharge oscillator with time-delayed feedback. Appl. Math. Mech. 39(10), 1128\u20131136 (2018)","journal-title":"Appl. Math. Mech."},{"issue":"1","key":"30_CR16","first-page":"1","volume":"12","author":"X Xu","year":"2018","unstructured":"Xu, X., Wang, S., Li, Y.: Identification and predication of network attack patterns in software-defined networking. Peer-to-Peer Netw. Appl. 12(1), 1\u201311 (2018)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"6","key":"30_CR17","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.cose.2016.11.008","volume":"65","author":"J Bang","year":"2017","unstructured":"Bang, J., Cho, Y.-J., Kang, K.: Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model. Comput. Secur. 65(6), 108\u2013120 (2017)","journal-title":"Comput. Secur."},{"issue":"4","key":"30_CR18","first-page":"1","volume":"22","author":"C Yin","year":"2017","unstructured":"Yin, C., Xia, L., Zhang, S., et al.: Improved clustering algorithm based on high-speed network data stream. Soft. Comput. 22(4), 1\u201311 (2017)","journal-title":"Soft. Comput."},{"issue":"2","key":"30_CR19","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1002\/tee.22927","volume":"14","author":"YH Park","year":"2019","unstructured":"Park, Y.H., Yun, I.D.: Arrhythmia detection in electrocardiogram based on recurrent neural network encoder\u2013decoder with Lyapunov exponent. IEEJ Trans. Elect. Electron. Eng. 14(2), 1273\u20131274 (2019)","journal-title":"IEEJ Trans. Elect. Electron. Eng."},{"issue":"1","key":"30_CR20","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1515\/hukin-2017-0062","volume":"57","author":"CJ Brito","year":"2017","unstructured":"Brito, C.J., Miarka, B., de Durana, A.L.D., et al.: Home advantage in Judo: analysis by the combat phase, penalties and the type of attack. J. Hum. Kinet. 57(1), 213\u2013220 (2017)","journal-title":"J. Hum. Kinet."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Multimedia Technology and Enhanced Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51100-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T02:00:08Z","timestamp":1619229608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-51100-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030510992","9783030511005"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51100-5_30","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICMTEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Technology and Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leicester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmtel2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icmtel.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"confyplus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"158","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"83","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic all papers were presented in YouTubeLive.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}