{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:49:48Z","timestamp":1743076188582,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319016214"},{"type":"electronic","value":"9783319016221"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01622-1_44","type":"book-chapter","created":{"date-parts":[[2013,7,19]],"date-time":"2013-07-19T05:36:59Z","timestamp":1374212219000},"page":"391-398","source":"Crossref","is-referenced-by-count":8,"title":["Machine Learning Techniques for Cyber Attacks Detection"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proc. of ACM Symposium on Applied Computing, pp. 201\u2013208 (2002)","DOI":"10.1145\/508791.508835"},{"key":"44_CR2","series-title":"AISC","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-33018-6_18","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions","author":"M. Chora\u015b","year":"2013","unstructured":"Chora\u015b, M., Kozik, R., Puchalski, D., Ho\u0142ubowicz, W.: Correlation Approach for SQL Injection Attacks Detection. In: Herrero, \u00c1., et al. (eds.) Int. Joint Conf. CISIS\u201912-ICEUTE\u201912-SOCO\u201912. AISC, vol.\u00a0189, pp. 177\u2013185. Springer, Heidelberg (2013)"},{"key":"44_CR3","unstructured":"NSG, \n                      http:\/\/www.ijcst.com\/vol31\/4\/sridevi.pdf"},{"key":"44_CR4","unstructured":"LESG, \n                      http:\/\/www.cs.northwestern.edu\/~ychen\/Papers\/LESG-ICNP07.pdf"},{"issue":"4","key":"44_CR5","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TSMCC.2010.2068544","volume":"41","author":"A. Shabtai","year":"2011","unstructured":"Shabtai, A., Menahem, E., Elovici, Y.: F-Sign: Automatic, Function-Based Signature Generation for Malware. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a041(4), 494\u2013508 (2011)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"44_CR6","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16161-2_1","volume-title":"Security and Privacy in Communication Networks","author":"D. Kong","year":"2010","unstructured":"Kong, D., Jhi, Y.-C., Gong, T., Zhu, S., Liu, P., Xi, H.: SAS: Semantics aware signature generation for polymorphic worm detection. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol.\u00a050, pp. 1\u201319. Springer, Heidelberg (2010)"},{"key":"44_CR7","unstructured":"SNORT. Project homepage, \n                      http:\/\/www.snort.org\/"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Sharma, M., Toshniwal, D.: Pre-clustering algorithm for anomaly detection and clustering that uses variable size buckets. In: 2012 1st International Conference on RecentAdvances in Information Technology (RAIT), pp. 515\u2013519 (2012)","DOI":"10.1109\/RAIT.2012.6194613"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Adaniya, M.H.A.C., Lima, M.F., Rodrigues, J.J.P.C., Abrao, T., Proenca, M.L.: Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm. In: 2012 IEEE International Conference on Communications (ICC), pp. 1183\u20131187 (2012)","DOI":"10.1109\/ICC.2012.6364088"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Mazel, J., Casas, P., Labit, Y., Owezarski, P.: Sub-Space clustering, Inter-Clustering Results Association and anomaly correlation for unsupervised network anomaly detection. In: 2011 7th International Conference on Network and Service Management (CNSM), pp. 1\u20138 (2011)","DOI":"10.1007\/978-3-642-20305-3_2"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Yang, C., Deng, F., Yang, H.: An Unsupervised Anomaly Detection Approach using Subtractive Clustering and Hidden Markov Model. In: Second International Conference on Communications and Networking in China, CHINACOM 2007, pp. 313\u2013316 (2007)","DOI":"10.1109\/CHINACOM.2007.4469390"},{"key":"44_CR12","unstructured":"Liang, H., Wei-wu, R., Fei, R.: An Adaptive Anomaly Detection Based on Hierarchical Clustering. In: 2009 1st International Conference on Information Science and Engineering (ICISE), pp. 1626\u20131629 (2009)"},{"issue":"2","key":"44_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.7155\/jgaa.00124","volume":"10","author":"P. Pons","year":"2006","unstructured":"Pons, P., Latapy, M.: Computing Communities in Large Networks Using Random Walks. Journal of Graph Algorithms and Applications\u00a010(2), 191\u2013218 (2006)","journal-title":"Journal of Graph Algorithms and Applications"},{"key":"44_CR14","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.1016\/j.comnet.2010.07.015","volume":"54","author":"Q. Liao","year":"2010","unstructured":"Liao, Q., Blaich, A., Van Bruggen, D., Striegel, A.: Managing networks through context: Graph visualization and exploration. Computer Networks\u00a054, 2809\u20132824 (2010)","journal-title":"Computer Networks"},{"key":"44_CR15","unstructured":"Ricciato, F., Fleischer, W.: Bottleneck Detection via Aggregate Rate Analysis: A Real Casein a 3G Network. In: Proc. IEEE\/IFIP NOMS (2004)"},{"issue":"8","key":"44_CR16","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M. Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Anomaly Detectionin IP Networks. IEEE Trans. Signal Processing, Special Issue of Signal Processing in Networking\u00a051(8), 2191\u20132204 (2003)","journal-title":"IEEE Trans. Signal Processing, Special Issue of Signal Processing in Networking"},{"issue":"5","key":"44_CR17","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/TNN.2005.853423","volume":"16","author":"I. Rish","year":"2005","unstructured":"Rish, I., Brodie, M., Sheng, M., Odintsova, N., Beygelzimer, A., Grabarnik, G., Hernandez, K.: Adaptive Diagnosis in Distributed Systems. IEEE Tran. Neural Networks\u00a016(5), 1088\u20131109 (2005)","journal-title":"IEEE Tran. Neural Networks"},{"issue":"3","key":"44_CR18","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/TKDE.2007.44","volume":"19","author":"S.R. Gaddam","year":"2007","unstructured":"Gaddam, S.R., Phoha, V.V., Balagani, K.S.: K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 DecisionTree Learning Methods. IEEE Transactions on Knowledge and Data Engineering\u00a019(3), 345\u2013354 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"44_CR19","doi-asserted-by":"crossref","unstructured":"Ma, R., Liu, Y., Lin, X., Wang, Z.: Network Anomaly Detection Using RBF Neural Network with Hybrid QPSO. In: IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, pp. 1284\u20131287 (2008)","DOI":"10.1109\/ICNSC.2008.4525415"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Ma, J., Dai, G., Xu, Z.: Network Anomaly Detection Using Dissimilarity-Based One-Class SVM Classifier. In: International Conference on Parallel Processing Workshops, ICPPW 2009, pp. 409\u2013414 (2009)","DOI":"10.1109\/ICPPW.2009.6"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Soule, A., Salamatian, K., Taft, N.: CombiningFiltering and Statistical Methods for AnomalyDetection. In: Proc. of IMC Workshop (2005)","DOI":"10.1145\/1330107.1330147"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing and Communications Challenges 5"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01622-1_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T00:37:16Z","timestamp":1676335036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01622-1_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319016214","9783319016221"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01622-1_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}