{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:12:14Z","timestamp":1725808334475},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125701"},{"type":"electronic","value":"9783319125718"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12571-8_28","type":"book-chapter","created":{"date-parts":[[2014,10,24]],"date-time":"2014-10-24T19:12:18Z","timestamp":1414177938000},"page":"321-332","source":"Crossref","is-referenced-by-count":6,"title":["Detecting Localised Anomalous Behaviour in a Computer Network"],"prefix":"10.1007","author":[{"given":"Melissa","family":"Turcotte","sequence":"first","affiliation":[]},{"given":"Nicholas","family":"Heard","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Neil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1093\/biomet\/82.4.711","volume":"82","author":"P.J. Green","year":"1995","unstructured":"Green, P.J.: Reversible jump Markov chain Monte Carlo computation and Bayesian model determination. Biometrika\u00a082, 711\u2013732 (1995)","journal-title":"Biometrika"},{"issue":"2","key":"28_CR2","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1214\/10-AOAS329","volume":"4","author":"N.A. Heard","year":"2010","unstructured":"Heard, N.A., Weston, D.J., Platanioti, K., Hand, D.J.: Bayesian anomaly detection methods for social networks. Annals of Applied Statistics\u00a04(2), 645\u2013662 (2010)","journal-title":"Annals of Applied Statistics"},{"key":"28_CR3","unstructured":"Hummel, C.: Why crack when you can pass the hash. SANS 21 (2009)"},{"key":"28_CR4","unstructured":"Kolaczyk, E.D.: Statistical Analysis of Network Data: Methods and Models. Springer, New York (2000)"},{"issue":"473","key":"28_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1198\/016214505000000943","volume":"101","author":"D. Lambert","year":"2006","unstructured":"Lambert, D., Liu, C.: Adaptive thresholds: Monitoring streams of network counts. Journal of the American Statistical Association\u00a0101(473), 78\u201388 (2006)","journal-title":"Journal of the American Statistical Association"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Ozgur, A., Ertoz, L., Srivastava, J., Kumar, V.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the Third SIAM International Conference on Data Mining, pp. 25\u201336 (2003)","DOI":"10.1137\/1.9781611972733.3"},{"issue":"4","key":"28_CR7","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/00401706.2013.822830","volume":"55","author":"J. Neil","year":"2013","unstructured":"Neil, J., Storlie, C., Hash, C., Brugh, A., Fisk, M.: Scan statistics for the online detection of locally anomalous subgraphs. Technometrics\u00a055(4), 403\u2013414 (2013)","journal-title":"Technometrics"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 631\u2013636. ACM (2003)","DOI":"10.1145\/956804.956831"},{"issue":"12","key":"28_CR9","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"Patcha, A., Park, J.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks\u00a051(12), 3448\u20133470 (2007)","journal-title":"Computer Networks"},{"issue":"3","key":"28_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10588-005-5378-z","volume":"11","author":"C.E. Priebe","year":"2005","unstructured":"Priebe, C.E., Conroy, J.M., Marchette, D.J.: Scan statistics on Enron graphs. Computational and Mathematical Organization Theory\u00a011(3), 229\u2013247 (2005)","journal-title":"Computational and Mathematical Organization Theory"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Sexton, J., Storlie, C., Neil, J., Kent, A.: Intruder detection based on graph structured hypothesis testing. In: 2013 6th International Symposium on Resilient Control Systems (ISRCS), pp. 86\u201391. IEEE (2013)","DOI":"10.1109\/ISRCS.2013.6623756"},{"issue":"3","key":"28_CR12","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A. Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP flow-based intrusion detection. IEEE Communications Surveys Tutorials\u00a012(3), 343\u2013356 (2010)","journal-title":"IEEE Communications Surveys Tutorials"}],"container-title":["Lecture Notes in Computer Science","Advances in Intelligent Data Analysis XIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12571-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T07:06:33Z","timestamp":1559027193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12571-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125701","9783319125718"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12571-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}