{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:11:55Z","timestamp":1742994715054,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030966263"},{"type":"electronic","value":"9783030966270"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96627-0_18","type":"book-chapter","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:22:32Z","timestamp":1651839752000},"page":"193-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Clustering Methods of Anomalies and Neural Networks to Conduct Additional Diagnostics of a Computer Network"],"prefix":"10.1007","author":[{"given":"Maxim","family":"Avilov","sequence":"first","affiliation":[]},{"given":"Yulia","family":"Shichkina","sequence":"additional","affiliation":[]},{"given":"Mikhail","family":"Kupriyanov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,7]]},"reference":[{"issue":"1","key":"18_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2012.6135854","volume":"4","author":"A Dainotti","year":"2012","unstructured":"Dainotti, A., Pescape, A., Claffy, K.C.: Issues and future directions in traffic classification. IEEE Netw. 4(1), 35\u201340 (2012)","journal-title":"IEEE Netw."},{"issue":"5","key":"18_CR2","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1109\/TIFS.2018.2878172","volume":"14","author":"Ch Ting","year":"2019","unstructured":"Ting, Ch., Field, R., Fisher, A., Bauer, T.: Compression analytics for classification and anomaly detection within network communication. IEEE Trans. Inf. Forensics Secur. 14(5), 1366\u20131376 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"18_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/35.41401","volume":"27","author":"RP Lippmann","year":"1989","unstructured":"Lippmann, R.P.: Pattern classification using neural networks. IEEE Commun. Mag. 27(11), 47\u201350 (1989)","journal-title":"IEEE Commun. Mag."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Garg, S., Singh, A., Batra, S., Kumar, N., Obaidat, M.S.: EnClass: ensemble-based classification model for network anomaly detection in massive datasets. In: IEEE Global Communications Conference, Singapore, pp. 1\u20137 (2017)","DOI":"10.1109\/GLOCOM.2017.8255025"},{"key":"18_CR5","first-page":"428","volume":"1787","author":"A Degtyarev","year":"2016","unstructured":"Degtyarev, A., Shichkina, Y., Koblov, A.: Technology of cleaning and transforming data using the Knowledge Discovery in Databases (KDD) technology for fast application of Data Mining methods. CEUR Workshop Proc. 1787, 428\u2013434 (2016)","journal-title":"CEUR Workshop Proc."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Pelc, M., Galus, D., Zolubak, M., Ozana, S., Chlewicki, W., Cichon, K., Podpora, M., Kawala Sterniuk, A.: Behavioural approach to network anomaly detection for resource-constrained system \u2013 presentation of the novel solution \u2013 preliminary study. IFAC-PapersOnLine 52(27), 121\u2013126 (2019)","DOI":"10.1016\/j.ifacol.2019.12.743"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2018.01.023","volume":"75","author":"Z Chiba","year":"2018","unstructured":"Chiba, Z., Abghour, N., Moussaid, Kh., El Omri, A., Rida, M.: A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection. Comput. Secur. 75, 36\u201358 (2018)","journal-title":"Comput. Secur."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Eltanbouly, S., Bashendy, M., AlNaimi, N., Chkirbene, Z., Erbad, A.: Machine learning techniques for network anomaly detection: a survey. In: IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, 2020, pp. 156\u2013162 (2020)","DOI":"10.1109\/ICIoT48696.2020.9089465"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.cose.2006.05.003","volume":"25","author":"M Amini","year":"2006","unstructured":"Amini, M., Jalili, R., Shahriari, H.: RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput. Secur. 25, 459\u2013468 (2006)","journal-title":"Comput. Secur."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Hamamoto, A.H., Carvalho, L.F., Hiera Sampaio, L.D., Abrao, T., Proenca Jr, M.Le.: Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Syst. Appl. 92, 390\u2013402 (2018)","DOI":"10.1016\/j.eswa.2017.09.013"},{"issue":"3","key":"18_CR11","first-page":"137","volume":"4","author":"AK Kanaev","year":"2012","unstructured":"Kanaev, A.K., Kamynina, M.A., Oparin, E.V.: Methods for detecting deviations in the functioning of data transmission network elements in the interests of the control system. Bull. Results Sci. Res. (in Russian) 4(3), 137\u2013148 (2012)","journal-title":"Bull. Results Sci. Res. (in Russian)"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96627-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:24:49Z","timestamp":1651839889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96627-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030966263","9783030966270"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96627-0_18","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idc2021.unirc.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}