{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:10:06Z","timestamp":1746367806093,"version":"3.40.4"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112886"},{"type":"electronic","value":"9783319112893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11289-3_67","type":"book-chapter","created":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T01:07:33Z","timestamp":1409879253000},"page":"663-672","source":"Crossref","is-referenced-by-count":0,"title":["Security Incident Detection Using Multidimensional Analysis of the Web Server Log Files"],"prefix":"10.1007","author":[{"given":"Grzegorz","family":"Ko\u0142aczek","sequence":"first","affiliation":[]},{"given":"Tomasz","family":"Kuzemko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","unstructured":"Multi-agent platform for security level evaluation of information and communication services. Grzegorz, Ko\u0142aczek. Springer, Berlin"},{"key":"67_CR2","unstructured":"Egeber, P.: Background on Heartbleed (2014)"},{"key":"67_CR3","unstructured":"Gudkov, O.: Calculation Algorithm for Network Flow Parameters Entropy in Anomaly Detection. Kaspersky Lab (2012), http:\/\/www.kaspersky.com\/images\/Oleg%20Gudkov.pdf"},{"key":"67_CR4","doi-asserted-by":"crossref","unstructured":"Lichodzijewski, P., et al.: Host-based intrusion detection using self-organizing maps. In: Neural Networks, pp. 1714\u20131719 (2002)","DOI":"10.1109\/IJCNN.2002.1007776"},{"key":"67_CR5","unstructured":"Heywood, M.I.: Dynamic intrusion detection using self-organizing maps (2002)"},{"key":"67_CR6","unstructured":"Rhodes, C.: Multiple self-organizing maps for intrusion detection. In: 23rd National Information Systems Security Conference (2000)"},{"issue":"1","key":"67_CR7","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1016\/j.asoc.2012.08.028","volume":"13","author":"D. Stevanovic","year":"2013","unstructured":"Stevanovic, D., Vlajic, N.: Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Applied Soft Computing\u00a013(1), 698\u2013708 (2013)","journal-title":"Applied Soft Computing"},{"key":"67_CR8","unstructured":"\u0141ukasz, B., Katarzyna, N., Micha\u0142, A., Grzegorz, K.: SOM-based system for anomaly detection in network traffic. Wroclaw University of Technology, Wroclaw (2013)"},{"key":"67_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1007\/978-3-642-31500-8_67","volume-title":"Parallel Processing and Applied Mathematics","author":"G. Kolaczek","year":"2012","unstructured":"Kolaczek, G., Juszczyszyn, K.: Traffic pattern analysis for distributed anomaly detection. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wa\u015bniewski, J. (eds.) PPAM 2011, Part II. LNCS, vol.\u00a07204, pp. 648\u2013657. Springer, Heidelberg (2012)"},{"key":"67_CR10","series-title":"AISC","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-81-322-1665-0_10","volume-title":"Intelligent Computing, Networking, and Informatics","author":"N. Singh","year":"2014","unstructured":"Singh, N., Jain, A., Raw, R.S., Raman, R.: Detection of Web-Based Attacks by Analyzing Web Server Log Files. In: Mohapatra, D.P., Patnaik, S. (eds.) Intelligent Computing, Networking, and Informatics. AISC, vol.\u00a0243, pp. 101\u2013109. Springer, Heidelberg (2014)"},{"key":"67_CR11","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-1-4471-6302-2_8","volume-title":"Communication Networks for Smart Grids","author":"K.C. Budka","year":"2014","unstructured":"Budka, K.C., Deshpande, J.G., Thottan, M.: Network Security. In: Communication Networks for Smart Grids, pp. 209\u2013225. Springer, London (2014)"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11289-3_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:28:09Z","timestamp":1746365289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11289-3_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112886","9783319112893"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11289-3_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}