{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T20:50:44Z","timestamp":1760820644834},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319126425"},{"type":"electronic","value":"9783319126432"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12643-2_40","type":"book-chapter","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T02:58:17Z","timestamp":1413946697000},"page":"325-332","source":"Crossref","is-referenced-by-count":6,"title":["Unknown Attack Detection by Multistage One-Class SVM Focusing on Communication Interval"],"prefix":"10.1007","author":[{"given":"Shohei","family":"Araki","sequence":"first","affiliation":[]},{"given":"Yukiko","family":"Yamaguchi","sequence":"additional","affiliation":[]},{"given":"Hajime","family":"Shimada","sequence":"additional","affiliation":[]},{"given":"Hiroki","family":"Takakura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"KDD Cup 1999 Dataset, \n                    \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"40_CR2","unstructured":"Kyoto2006+ Dataset, \n                    \n                      http:\/\/www.takakura.com\/Kyoto_data\/"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection. In: Applications of Data Mining in Computer Security, pp. 77\u2013101. Springer (2002)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-540-75651-4_7","volume-title":"Advances in Information and Computer Security","author":"S. Kondo","year":"2007","unstructured":"Kondo, S., Sato, N.: Botnet traffic detection techniques by C&C session classification using SVM. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 91\u2013104. Springer, Heidelberg (2007)"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Perdisci, R., Gu, G., Lee, W.: Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems. In: Sixth International Conference on Data Mining, ICDM 2006, pp. 488\u2013498. IEEE (2006)","DOI":"10.1109\/ICDM.2006.165"},{"issue":"7","key":"40_CR6","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B. Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J., Shawe-Taylor, J., Smola, A., Williamson, R.: Estimating the support of a high-dimensional distribution. Neural Comput.\u00a013(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Song, J., Ohira, K., Takakura, H., Okabe, Y., Kwon, Y.: A clustering method for improving performance of anomaly-based intrusion detection system. IEICE - Trans. Inf. Syst. E91-D(5), 1282\u20131291 (2008)","DOI":"10.1093\/ietisy\/e91-d.5.1282"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Song, J., Takakura, H., Kwon, Y.: A generalized feature extraction scheme to detect 0-day attacks via IDS alerts. In: The 2008 International Symposium on Applications and the Internet (SAINT 2008), pp. 55\u201361 (2008)","DOI":"10.1109\/SAINT.2008.85"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12643-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T06:31:33Z","timestamp":1559025093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12643-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319126425","9783319126432"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12643-2_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}