{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:26:45Z","timestamp":1742912805956,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257433"},{"type":"electronic","value":"9783319257440"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25744-0_3","type":"book-chapter","created":{"date-parts":[[2015,11,29]],"date-time":"2015-11-29T07:46:38Z","timestamp":1448783198000},"page":"28-40","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging Event Structure for Adaptive Machine Learning on Big Data Landscapes"],"prefix":"10.1007","author":[{"given":"Amir","family":"Azodi","sequence":"first","affiliation":[]},{"given":"Marian","family":"Gawron","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Sapegin","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"unstructured":"Cheng, F., Meinel, C., Azodi, A., Jaeger, D.: A new approach to building a multi-tier direct access knowledgebase for ids\/siem systems. In: Proceedings of the 11th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2013), Chengdu, China, 12 2013. IEEE CS (2013)","key":"3_CR1"},{"unstructured":"Cheng, F., Meinel, C., Azodi, A., Jaeger, D.: Pushing the limits in event normalisation to improve attack detection in ids\/siem systems. In: Proceedings of the 1st International Conference on Advanced Cloud and Big Data, Nanjing, China, 12 2013. IEEE CS (2013)","key":"3_CR2"},{"unstructured":"Azodi, A., Gawron, M., Cheng, F., Meinel, C., Sapegin, A., Jaeger, D.: Hierarchical object log format for normalization of security events. In: Proceedings of the 9th International Conference on Information Assurance and Security (IAS 2013), Tunis, Tunisia, 12 2013. IEEE CS (2013)","key":"3_CR3"},{"unstructured":"Aumasson, J.-P., Bernstein, D.J.: Siphash: a fast short-input prf, Jan 2015. \nhttps:\/\/131002.net\/siphash\/","key":"3_CR4"},{"unstructured":"Brink, H., Richards, J.: Real-world machine learning. In: MEAP, pp. 1\u201322 (2014)","key":"3_CR5"},{"issue":"2","key":"3_CR6","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJC Burges","year":"1998","unstructured":"Burges, C.J.C.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Disc. 2(2), 121\u2013167 (1998)","journal-title":"Data Min. Knowl. Disc."},{"unstructured":"Consul, P.C., Famoye, F.: Generalized poisson distribution. In: Lagrangian Probability Distributions, pp. 165\u2013190 (2006)","key":"3_CR7"},{"unstructured":"Fangohr, H.: Performance of python\u2019s long data type, Jan 2013. \nhttp:\/\/www.southampton.ac.uk\/~fangohr\/blog\/performance-of-pythons-long-data-type.html","key":"3_CR8"},{"unstructured":"Google Inc. Cityhash provides hash functions for strings, Jan 2010. \nhttps:\/\/code.google.com\/p\/cityhash\/","key":"3_CR9"},{"unstructured":"Google Inc. The farmhash family of hash functions, Jan 2015. \nhttps:\/\/code.google.com\/p\/farmhash\/","key":"3_CR10"},{"key":"3_CR11","doi-asserted-by":"crossref","first-page":"100","DOI":"10.2307\/2346830","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: Algorithm as 136: a k-means clustering algorithm. Appl. Stat. 28, 100\u2013108 (1979)","journal-title":"Appl. Stat."},{"key":"3_CR12","volume-title":"Spatial Tessellations: Concepts and Applications of Voronoi Diagrams","author":"A Okabe","year":"2009","unstructured":"Okabe, A., Boots, B., Sugihara, K., Chiu, S.N.: Spatial Tessellations: Concepts and Applications of Voronoi Diagrams, vol. 501. Wiley, New York (2009)"},{"unstructured":"Schneider, P.: Tcp\/ip traffic classification based on port numbers. Division of Applied Sciences, Cambridge, MA, 2138 (1996)","key":"3_CR13"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/3-540-54891-2_20","volume-title":"Computational Geometry - Methods, Algorithms and Applications","author":"T Schreiber","year":"1991","unstructured":"Schreiber, T.: A voronoi diagram based adaptive k-means-type clustering algorithm for multidimensional weighted data. In: Bieri, H., Noltemeier, H. (eds.) CG-WS 1991. LNCS, vol. 553, pp. 265\u2013275. Springer, Heidelberg (1991)"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25744-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T08:47:49Z","timestamp":1501577269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25744-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257433","9783319257440"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25744-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}