{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:18:52Z","timestamp":1743103132630,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_39","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"415-425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Approach for Density-Approximating Neural Network Models for Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Martin","family":"Flusser","sequence":"first","affiliation":[]},{"given":"Petr","family":"Somol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"issue":"9","key":"39_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1145\/361002.361007","volume":"18","author":"JL Bentley","year":"1975","unstructured":"Bentley, J.L.: Multidimensional binary search trees used for associative searching. Commun. ACM 18(9), 509\u2013517 (1975)","journal-title":"Commun. ACM"},{"key":"39_CR2","unstructured":"Cannady, J.: Artificial neural networks for misuse detection. In: National Information Systems Security Conference, pp. 368\u2013381 (1998)"},{"issue":"3","key":"39_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"39_CR4","unstructured":"Demuth, H.B., Beale, M.H., De\u00a0Jess, O., Hagan, M.T.: Neural Network Design. Martin Hagan (2014)"},{"key":"39_CR5","unstructured":"Dem\u0161ar, J.: Statistical comparisons of classifiers over multiple data sets. J. Mach. Learn. Res. 7, 1\u201330 (2006). http:\/\/dl.acm.org\/citation.cfm?id=1248547.1248548"},{"key":"39_CR6","doi-asserted-by":"publisher","unstructured":"Emmott, A.F., Das, S., Dietterich, T., Fern, A., Wong, W.K.: Systematic construction of anomaly detection benchmarks from real data. In: Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description, ODD 2013, pp. 16\u201321. ACM, New York (2013). https:\/\/doi.org\/10.1145\/2500853.2500858 , http:\/\/doi.acm.org\/10.1145\/2500853.2500858","DOI":"10.1145\/2500853.2500858"},{"key":"39_CR7","unstructured":"Flusser, M., Pevn\u00fd, T., Somol, P.: Density-approximating neural network models for anomaly detection. In: ACM SIGKDD Workshop on Outlier Detection De-Constructed (2018)"},{"key":"39_CR8","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016)"},{"key":"39_CR9","first-page":"2529","volume":"13","author":"J Kim","year":"2012","unstructured":"Kim, J., Scott, C.D.: Robust kernel density estimation. J. Mach. Learn. Res. 13, 2529\u20132565 (2012)","journal-title":"J. Mach. Learn. Res."},{"issue":"4","key":"39_CR10","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1214\/aos\/1032298287","volume":"24","author":"CR Loader","year":"1996","unstructured":"Loader, C.R.: Local likelihood density estimation. Ann. Statist. 24(4), 1602\u20131618 (1996). https:\/\/doi.org\/10.1214\/aos\/1032298287","journal-title":"Ann. Statist."},{"key":"39_CR11","unstructured":"Mika, S., et al.: Kernel PCA and de-noising in feature spaces. In: Advances in Neural Information Processing Systems, pp. 536\u2013542 (1999)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: IJCNN 2002, vol.\u00a02, pp. 1702\u20131707. IEEE (2002)","DOI":"10.1007\/978-3-7908-1782-9_10"},{"key":"39_CR13","unstructured":"Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. In: Advances in Neural Information Processing Systems, pp. 943\u2013949 (1998)"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Sarasamma, S.T., Zhu, Q.A., Huff, J.: Hierarchical kohonenen net for anomaly detection in network security (2005)","DOI":"10.1109\/TSMCB.2005.843274"},{"issue":"7","key":"39_CR15","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"issue":"4","key":"39_CR16","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/0020-0190(91)90074-R","volume":"40","author":"JK Uhlmann","year":"1991","unstructured":"Uhlmann, J.K.: Satisfying general proximity\/similarity queries with metric trees. Inf. Process. Lett. 40(4), 175\u2013179 (1991)","journal-title":"Inf. Process. Lett."},{"key":"39_CR17","unstructured":"Zhai, S., Cheng, Y., Lu, W., Zhang, Z.: Deep structured energy based models for anomaly detection. In: ICML 2016, pp. 1100\u20131109. JMLR.org (2016)"},{"key":"39_CR18","unstructured":"Zhao, M., Saligrama, V.: Anomaly detection with score functions based on nearest neighbor graphs. In: Advances in Neural Information Processing Systems, pp. 2250\u20132258 (2009)"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T11:34:52Z","timestamp":1668080092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}