{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:36:20Z","timestamp":1742992580603,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319168678"},{"type":"electronic","value":"9783319168685"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16868-5_7","type":"book-chapter","created":{"date-parts":[[2015,4,6]],"date-time":"2015-04-06T11:57:20Z","timestamp":1428321440000},"page":"71-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Investigation of Scalable Anomaly Detection Techniques for a Large Network of Wi-Fi Hotspots"],"prefix":"10.1007","author":[{"given":"Pheeha","family":"Machaka","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Bagula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,7]]},"reference":[{"issue":"7","key":"7_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MC.2003.1212682","volume":"36","author":"SJ Vaughan-Nichols","year":"2003","unstructured":"Vaughan-Nichols, S.J.: The challenge of wi-fi roaming. Computer 36(7), 17\u201319 (2003)","journal-title":"Computer"},{"key":"7_CR2","unstructured":"Cannady, J.: Artificial neural networks for misuse detection. In: Presented at National Information Systems Security Conference (1998)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/11534310_51","volume-title":"Networking and Mobile Computing","author":"E Cheng","year":"2005","unstructured":"Cheng, E., Jin, H., Han, Z., Sun, J.: Network-based anomaly detection using an elman network. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 471\u2013480. Springer, Heidelberg (2005)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: Presented at IEEE International Conference On Communications, ICC 2006 (2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"7_CR5","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings IEEE Symposium On Presented at Security and Privacy (1996)"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TEVC.2002.1011541","volume":"6","author":"D Dasgupta","year":"2002","unstructured":"Dasgupta, D., Gonz\u00e1lez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Trans. Evol. Comput. 6(3), 281\u2013291 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.: A cooperative AIS framework for intrusion detection. In: Presented at IEEE International Conference On Communications. ICC 2007 (2007)","DOI":"10.1109\/ICC.2007.237"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-74827-4_18","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"B Cha","year":"2007","unstructured":"Cha, B., Lee, D.: Network-based anomaly intrusion detection improvement by bayesian network and indirect relation. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 141\u2013148. Springer, Heidelberg (2007)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Machaka, P., Bagula, A., De Wet, N.: A highly scalable monitoring tool for wi-fi networks. In: Presented at 2012 IEEE 1st International Symposium On Wireless Systems (IDAACS-SWS) (2012)","DOI":"10.1109\/IDAACS-SWS.2012.6377643"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-642-21560-5_41","volume-title":"Wired\/Wireless Internet Communications","author":"P Machaka","year":"2011","unstructured":"Machaka, P., Bagula, A.: Preemptive performance monitoring of a large network of wi-fi hotspots: an artificial immune system. In: Masip-Bruin, X., Verchere, D., Tsaoussidis, V., Yannuzzi, M. (eds.) WWIC 2011. LNCS, vol. 6649, pp. 494\u2013504. Springer, Heidelberg (2011)"},{"key":"7_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-642-32711-7_14","volume-title":"Bio-Inspired Models of Networks, Information, and Computing Systems","author":"P Machaka","year":"2012","unstructured":"Machaka, P., Mabande, T., Bagula, A.: Monitoring of a large wi-fi hotspots network: performance investigation of soft computing techniques. In: Hart, E., Timmis, J., Mitchell, P., Nakamo, T., Dabiri, F. (eds.) BIONETICS 2011. LNICST, vol. 103, pp. 155\u2013162. Springer, Heidelberg (2012)"},{"key":"7_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470148150","volume-title":"A Statistical Approach to Neural Networks for Pattern Recognition","author":"RA Dunne","year":"2007","unstructured":"Dunne, R.A.: A Statistical Approach to Neural Networks for Pattern Recognition, vol. 702. Wiley, New York (2007)"},{"key":"7_CR13","volume-title":"Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis","author":"UB Kjr\u00e6ulff","year":"2012","unstructured":"Kjr\u00e6ulff, U.B., Madsen, A.L.: Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis, vol. 22. Springer, New York (2012)"},{"key":"7_CR14","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"IH Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Elsevier Inc., Oxford (2005)"},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/B:GENP.0000030197.83685.94","volume":"5","author":"A Watkins","year":"2004","unstructured":"Watkins, A., Timmis, J., Boggess, L.: Artificial immune recognition system (AIRS): an immune-inspired supervised learning algorithm. Genet. Program. Evolvable Mach. 5(3), 291\u2013317 (2004)","journal-title":"Genet. Program. Evolvable Mach."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Scalable Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16868-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T09:08:52Z","timestamp":1676452132000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16868-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319168678","9783319168685"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16868-5_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"7 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}