{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:23Z","timestamp":1742914163506,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813245"},{"type":"electronic","value":"9783031813252"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81325-2_23","type":"book-chapter","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:08:11Z","timestamp":1740409691000},"page":"325-333","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ambiguity Function as a Network Intrusion Detection Indicator"],"prefix":"10.1007","author":[{"given":"Spiros","family":"Chountasis","sequence":"first","affiliation":[]},{"given":"Dimitris","family":"Sklavounos","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Pappas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"23_CR1","volume-title":"Time-frequency signal analysis and processing: a comprehensive reference","author":"B Boashash","year":"2015","unstructured":"Boashash, B.: Time-frequency signal analysis and processing: a comprehensive reference. Academic press, US (2015)"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1007\/s10586-020-03203-1","volume":"24","author":"B Bouyeddou","year":"2021","unstructured":"Bouyeddou, B., Harrou, F., Kadri, B., Sun, Y.: Detecting network cyber-attacks using an integrated statistical approach. Clust. Comput. 24(2), 1435\u20131453 (2021)","journal-title":"Clust. Comput."},{"issue":"332","key":"23_CR3","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1179\/1752270613Y.0000000045","volume":"45","author":"S Cellmer","year":"2013","unstructured":"Cellmer, S.: Search procedure for improving modified ambiguity function approach. Surv. Rev. 45(332), 380\u2013385 (2013)","journal-title":"Surv. Rev."},{"issue":"4","key":"23_CR4","first-page":"226","volume":"5","author":"J Mbugua Chahira","year":"2016","unstructured":"Mbugua Chahira, J., Kinanu Kiruki, J., Kiprono Kemei, P.: A review of intrusion alerts correlation frameworks. Int. J. Comput. Appl. Technol. Res. 5(4), 226\u2013233 (2016)","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"issue":"1","key":"23_CR5","doi-asserted-by":"publisher","first-page":"152","DOI":"10.4218\/etrij.2019-0476","volume":"43","author":"S Chountasis","year":"2021","unstructured":"Chountasis, S., Pappas, D., Sklavounos, D.: Network intrusion detection method based on matrix factorization of their time and frequency representations. ETRI J. 43(1), 152\u2013162 (2021)","journal-title":"ETRI J."},{"issue":"3","key":"23_CR6","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1016\/j.sigpro.2003.12.006","volume":"84","author":"Igor Djurovi\u0107 and LJubi\u0161a Stankovi\u0107","year":"2004","unstructured":"Igor Djurovi\u0107 and LJubi\u0161a Stankovi\u0107: An algorithm for the Wigner distribution based instantaneous frequency estimation in a high noise environment. Signal Process. 84(3), 631\u2013643 (2004)","journal-title":"Signal Process."},{"key":"23_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113252","volume":"149","author":"Taegong Kim and Cheong Hee Park","year":"2020","unstructured":"Taegong Kim and Cheong Hee Park: Anomaly pattern detection for streaming data. Expert Syst. Appl. 149, 113252 (2020)","journal-title":"Expert Syst. Appl."},{"issue":"1\u20133","key":"23_CR8","first-page":"18","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inform. Secur. J.: A Global Perspect. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inform. Secur. J.: A Global Perspect."},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set), In: IEEE military communications and information systems conference (MilCIS), pp. 1\u20136. (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"4","key":"23_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.17781\/P002630","volume":"8","author":"D Sklavounos","year":"2019","unstructured":"Sklavounos, D., Chountasis, S., Edoh, A.: Network attack detection method based on their time-frequency decomposition. Int. J. Cyber-Secur. Digital Forensics 8(4), 273\u2013278 (2019)","journal-title":"Int. J. Cyber-Secur. Digital Forensics"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81325-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:08:16Z","timestamp":1740409696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81325-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813245","9783031813252"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81325-2_23","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}