{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:03:46Z","timestamp":1748837026472,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319288642"},{"type":"electronic","value":"9783319288659"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28865-9_45","type":"book-chapter","created":{"date-parts":[[2016,1,23]],"date-time":"2016-01-23T08:40:02Z","timestamp":1453538402000},"page":"682-696","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Clustering Algorithm for Database Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Jinkun","family":"Geng","sequence":"first","affiliation":[]},{"given":"Daren","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Pin","family":"Lv","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania (1980)"},{"key":"45_CR2","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Usenix Security (1998)"},{"key":"45_CR3","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"2","author":"DE Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Transactions on Software Engineering 2, 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Sherif, J.S., Dearmond, T.G.: Intrusion detection: systems and models. In: 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 115\u2013115. IEEE Computer Society (2002)","DOI":"10.1109\/ENABL.2002.1029998"},{"key":"45_CR5","unstructured":"Eskin, E., Miller, M., Zhong, Z.D., et al.: Adaptive model generation for intrusion detection systems (2000)"},{"key":"45_CR6","unstructured":"Ashoor, A.S., Gore, S.: Intrusion detection system (IDS): case study. In: Proceedings of 2011 International Conference on Advanced Materials Engineering (ICAME 2011) (2011)"},{"key":"45_CR7","unstructured":"Kokane, S., Jadhav, A., Mandhare, N., et al.: Intrusion Detection in RBAC Model"},{"key":"45_CR8","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1016\/j.phpro.2012.03.287","volume":"25","author":"J Zhang","year":"2012","unstructured":"Zhang, J., Chen, X.: Research on Intrusion Detection of Database based on Rough Set. Physics Procedia 25, 1637\u20131641 (2012)","journal-title":"Physics Procedia"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Ye, X., Xie, F., et al.: A practical database intrusion detection system framework. In: Ninth IEEE International Conference on Computer and Information Technology, CIT 2009, vol. 1, pp. 342\u2013347. IEEE (2009)","DOI":"10.1109\/CIT.2009.69"},{"key":"45_CR10","unstructured":"Pang-Ning, T., Steinbach, M., Kumar, V.: Introduction to data mining. Library of Congress (2006)"},{"key":"45_CR11","unstructured":"Campos, M.M., Milenova, B.L.: Creation and deployment of data mining-based intrusion detection systems in oracle database l0g. In: Proceedings of the Fourth International Conference on Machine Learning and Applications, 2005, p. 8. IEEE (2005)"},{"key":"45_CR12","unstructured":"Bloedorn, E., Christiansen, A.D., Hill, W., et al.: Data mining for network intrusion detection: How to get started. MITRE Technical Report (2001)"},{"key":"45_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.future.2013.06.027","volume":"37","author":"W Feng","year":"2014","unstructured":"Feng, W., Zhang, Q., Hu, G., et al.: Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems 37, 127\u2013140 (2014)","journal-title":"Future Generation Computer Systems"},{"issue":"11","key":"45_CR14","doi-asserted-by":"publisher","first-page":"5416","DOI":"10.1016\/j.eswa.2014.02.041","volume":"41","author":"MY Kim","year":"2014","unstructured":"Kim, M.Y., Lee, D.H.: Data-mining based SQL injection attack detection using internal query trees. Expert Systems with Applications 41(11), 5416\u20135430 (2014)","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"45_CR15","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.istr.2005.07.001","volume":"10","author":"T Pietraszek","year":"2005","unstructured":"Pietraszek, T., Tanner, A.: Data mining and machine learning\u2014towards reducing false positives in intrusion detection. Information Security Technical Report 10(3), 169\u2013183 (2005)","journal-title":"Information Security Technical Report"},{"issue":"11","key":"45_CR16","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1016\/j.patrec.2004.04.007","volume":"25","author":"SS Khan","year":"2004","unstructured":"Khan, S.S., Ahmad, A.: Cluster center initialization algorithm for K-means clustering. Pattern Recognition Letters 25(11), 1293\u20131302 (2004)","journal-title":"Pattern Recognition Letters"},{"issue":"6","key":"45_CR17","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TPAMI.2002.1008381","volume":"24","author":"P Mitra","year":"2002","unstructured":"Mitra, P., Murthy, C.A., Pal, S.K.: Density-based multiscale data condensation. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(6), 734\u2013747 (2002)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"45_CR18","unstructured":"Macqueen, J., et al.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297 1967: Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195\u2013197 (1981)"},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Brossette, S.E., Ahymel, P.: Data mining and infection control. Clinics in Laboratory Medicine 28(1) (2008)","DOI":"10.1016\/j.cll.2007.10.007"},{"issue":"475","key":"45_CR20","first-page":"1317","volume":"38","author":"P Giudici","year":"2006","unstructured":"Giudici, P.: Applied Data Mining: Statistical Methods for Business and Industry. Journal of the American Statistical Association 38(475), 1317\u20131318 (2006)","journal-title":"Journal of the American Statistical Association"},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Luan, J.: Data Mining and Knowledge Management in Higher Education -Potential Applications. Cluster Analysis (2002)","DOI":"10.1002\/ir.35"},{"key":"45_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/11731139_75","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"B Zou","year":"2006","unstructured":"Zou, B., Ma, X., Kemme, B., Newton, G., Precup, D.: Data mining using relational database management systems. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 657\u2013667. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28865-9_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T06:37:01Z","timestamp":1748759821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28865-9_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319288642","9783319288659"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28865-9_45","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}