{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:44:34Z","timestamp":1725853474825},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319320335"},{"type":"electronic","value":"9783319320342"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32034-2_37","type":"book-chapter","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T05:23:19Z","timestamp":1460611399000},"page":"441-450","source":"Crossref","is-referenced-by-count":8,"title":["Solution to Data Imbalance Problem in Application Layer Anomaly Detection Systems"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,14]]},"reference":[{"key":"37_CR1","unstructured":"OWASP Top 10 2013. OWASP project homepage. \n                      https:\/\/www.owasp.org\/index.php\/Top_10_2013-Top_10"},{"key":"37_CR2","unstructured":"Stuxnet malware. \n                      http:\/\/www.kaspersky.com\/about\/news\/virus\/2014\/Stuxnet-Patient-Zero-First-Victims-of-the-Infamous-Worm-Revealed"},{"key":"37_CR3","unstructured":"Black Energy botnet. \n                      http:\/\/www.kaspersky.com\/about\/news\/virus\/2010\/Most_wanted_the_Black_Energy_bot"},{"key":"37_CR4","unstructured":"https:\/\/ics-cert.us-cert.gov\/alerts\/ICS-ALERT-14-176-02A"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Vigna, G.: Anomaly detection of web-based attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 251\u2013261 (2003)","DOI":"10.1145\/948109.948144"},{"key":"37_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-56024-6_19","volume-title":"Combinatorial Pattern Matching","author":"L Chi","year":"1992","unstructured":"Chi, L., Hui, K.: Color set size problem with applications to string matching. In: Apostolico, A., Galil, Z., Manber, U., Crochemore, M. (eds.) CPM 1992. LNCS, vol. 644, pp. 230\u2013243. Springer, Heidelberg (1992)"},{"key":"37_CR7","unstructured":"Torrano-Gimnez, C., Prez-Villegas, A., Alvarez, G.: The HTTP dataset CSIC 2010. \n                      http:\/\/users.aber.ac.uk\/pds7\/csic_dataset\/csic2010http.html"},{"key":"37_CR8","series-title":"Studies in Computational Intelligence","volume-title":"Hybrid Classifiers: Methods of Data, Knowledge, and Classifier Combination","author":"M Wozniak","year":"2013","unstructured":"Wozniak, M.: Hybrid Classifiers: Methods of Data, Knowledge, and Classifier Combination. Studies in Computational Intelligence. Springer, Heidelberg (2013)"},{"key":"37_CR9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/978-1-4471-0123-9_3","volume-title":"Soft Computing and Industry","author":"David H. Wolpert","year":"2002","unstructured":"Wolpert, D.H.: The supervised learning no-free-lunch theorems, In: Proceedings of 6th Online World Conference on Soft Computing in Industrial Applications, pp. 25\u201342 (2001)"},{"key":"37_CR10","series-title":"Morgan Kaufmann Series in Data Management Systems","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"E Frank","year":"2005","unstructured":"Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"},{"issue":"3","key":"37_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0020-7373(87)80053-6","volume":"27","author":"J Quinlan","year":"1987","unstructured":"Quinlan, J.: Simplifying decision trees. I. J. Man Mach. Stud. 27(3), 221\u2013234 (1987)","journal-title":"I. J. Man Mach. Stud."},{"issue":"2","key":"37_CR12","doi-asserted-by":"crossref","first-page":"498","DOI":"10.21917\/ijsc.2013.0075","volume":"3","author":"SK Jayanthi","year":"2013","unstructured":"Jayanthi, S.K., Sasikala, S.: REPTree classifier for identifying link spam in web search engines. IJSC 3(2), 498\u2013505 (2013)","journal-title":"IJSC"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32034-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T20:18:30Z","timestamp":1559420310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32034-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319320335","9783319320342"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32034-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}