{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T14:55:42Z","timestamp":1763477742443,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030781231"},{"type":"electronic","value":"9783030781248"}],"license":[{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:00:00Z","timestamp":1635897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-78124-8_14","type":"book-chapter","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:03:50Z","timestamp":1635897830000},"page":"315-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Automatic Log Analysis to Prevent Cyber\u00a0Attacks"],"prefix":"10.1007","author":[{"given":"Andre","family":"Brandao","sequence":"first","affiliation":[]},{"given":"Petia","family":"Georgieva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,3]]},"reference":[{"key":"14_CR1","unstructured":"Portnoy, L.: Intrusion detection with unlabeled data using clustering. Ph.D. dissertation, Columbia University (2000)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Laskov, P., D\u00fcssel, P., Sch\u00e4fer, C., Rieck K.: Learning intrusion detection: supervised or unsupervised? In: International Conference on Image Analysis and Processing, pp. 50\u201357. Springer (2005)","DOI":"10.1007\/11553595_6"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Yen, T.-F., Oprea, A., Onarlioglu, K., Leetham, T., Robertson, W., Juels, A., Kirda, E.L Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. In: Proceedings of the 29th Annual Computer Security Applications Conference, pp. 199\u2013208. ACM (2013)","DOI":"10.1145\/2523649.2523670"},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1186\/1869-0238-4-7","volume":"4","author":"K Stroeh","year":"2013","unstructured":"Stroeh, K., Madeira, E.R.M., Goldenstein, S.K.: An approach to the correlation of security events based on machine learning techniques. J. Internet Serv. Appl. 4(1), 7 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"14_CR5","unstructured":"Li, W.: Automatic log analysis using machine learning: awesome automatic log analysis version 2.0 (2013)"},{"key":"14_CR6","unstructured":"Vasquez\u00a0Villano, E.G.: Classification of logs using machine learning technique. Master\u2019s thesis, NTNU (2018)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Vigneswaran, K.R., Vinayakumar, R., Soman, K., Poornachandran, P.: Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICCCNT.2018.8494096"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Dion\u00edsio, N., Alves, F., Ferreira, P.M., Bessani, A.: Cyberthreat detection from twitter using deep neural networks. arXiv preprint arXiv:1904.01127 (2019)","DOI":"10.1109\/IJCNN.2019.8852475"},{"issue":"19","key":"14_CR9","first-page":"28","volume":"45","author":"B Deokar","year":"2012","unstructured":"Deokar, B., Hazarnis, A.: Intrusion detection system using log files and reinforcement learning. Int. J. Comput. Appl. 45(19), 28\u201335 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Bulavas, V.: Investigation of network intrusion detection using data visualization methods. In: 2018 59th International Scientific Conference on Information Technology and Management Science of Riga Technical University (ITMS), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ITMS.2018.8552977"},{"issue":"1","key":"14_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.14257\/ijdta.2015.8.1.16","volume":"8","author":"V Rampure","year":"2015","unstructured":"Rampure, V., Tiwari, A.: A rough set based feature selection on KDD Cup 99 data set. Int. J. Database Theory Appl. 8(1), 149\u2013156 (2015)","journal-title":"Int. J. Database Theory Appl."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Bozhkov, L., Georgieva, P.: Brain neural data analysis with feature space defined by descriptive statistics. In: Iberian Conference on Pattern Recognition and Image Analysis, pp. 415\u2013422. Springer (2015)","DOI":"10.1007\/978-3-319-19390-8_47"},{"key":"14_CR13","unstructured":"Tucker, L.R., MacCallum, R.C.: Exploratory factor analysis. Unpublished manuscript, Ohio State University, Columbus (1997)"},{"key":"14_CR14","unstructured":"Stolfo, J., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection. Results from the JAM Project by Salvatore, pp. 1\u201315 (2000)"}],"container-title":["Studies in Systems, Decision and Control","Advances in Intelligent Systems Research and Innovation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78124-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T00:14:04Z","timestamp":1635898444000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78124-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,3]]},"ISBN":["9783030781231","9783030781248"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78124-8_14","relation":{},"ISSN":["2198-4182","2198-4190"],"issn-type":[{"type":"print","value":"2198-4182"},{"type":"electronic","value":"2198-4190"}],"subject":[],"published":{"date-parts":[[2021,11,3]]},"assertion":[{"value":"3 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}