{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:51:54Z","timestamp":1725871914046},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_30","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"509-520","source":"Crossref","is-referenced-by-count":4,"title":["Towards Useful Anomaly Detection for Back Office Networks"],"prefix":"10.1007","author":[{"given":"\u00d6mer","family":"Y\u00fcksel","sequence":"first","affiliation":[]},{"given":"Jerry","family":"den Hartog","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-33338-5_18","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"D Had\u017eiosmanovi\u0107","year":"2012","unstructured":"Had\u017eiosmanovi\u0107, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S.: N-gram against the machine: on the feasibility of the N-gram network analysis for binary protocols. In: Balzarotti, D., Stolfo, S.J., Cova, M. (eds.) RAID 2012. LNCS, vol. 7462, pp. 354\u2013373. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33338-5_18"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-662-43936-4_16","volume-title":"Data and Applications Security and Privacy XXVIII","author":"E Costante","year":"2014","unstructured":"Costante, E., Hartog, J., Petkovi\u0107, M., Etalle, S., Pechenizkiy, M.: Hunting the unknown. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 243\u2013259. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43936-4_16"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Costante, E., Etalle, S., Fauri, D., den Hartog, J.I., Zannone, N.: A hybrid framework for data loss prevention and detection. In: Workshop on Research for Insider Threats (2016)","DOI":"10.1109\/SPW.2016.24"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Y\u00fcksel, O., den Hartog, J., Etalle, S.: Reading between the fields: practical, effective intrusion detection for industrial control systems. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC 2016), pp. 2063\u20132070. ACM (2016)","DOI":"10.1145\/2851613.2851799"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Kloft, M., Brefeld, U., D\u00fcessel, P., Gehl, C., Laskov, P.: Automatic feature selection for anomaly detection. In: Proceedings of the 1st ACM Workshop on Workshop on AISec (AISec 2008), pp. 71\u201376, NY, USA. ACM, New York (2008)","DOI":"10.1145\/1456377.1456395"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-319-11212-1_22","volume-title":"Computer Security - ESORICS 2014","author":"C Gates","year":"2014","unstructured":"Gates, C., Li, N., Xu, Z., Chari, S.N., Molloy, I., Park, Y.: Detecting insider information theft using features from file access logs. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 383\u2013400. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-11212-1_22"},{"issue":"2","key":"30_CR7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1080\/00396338.2013.784468","volume":"55","author":"C Bronk","year":"2013","unstructured":"Bronk, C., Tikk-Ringas, E.: The cyber attack on saudi aramco. Survival 55(2), 81\u201396 (2013)","journal-title":"Survival"},{"key":"30_CR8","unstructured":"Windows Protocols (2016). https:\/\/msdn.microsoft.com\/en-us\/library\/jj712081.aspx . Accessed 29 Sep 2016"},{"issue":"1","key":"30_CR9","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"30_CR10","volume-title":"Set Theory An Introduction to Independence Proofs","author":"K Kunen","year":"2014","unstructured":"Kunen, K.: Set Theory An Introduction to Independence Proofs, vol. 102. Elsevier, Amsterdam (2014)"},{"key":"30_CR11","series-title":"Advances in Information Security","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/978-1-4615-0953-0_4","volume-title":"Applications of Data Mining in Computer Security","author":"E Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection. In: Barbar\u00e1, D., Jajodia, D. (eds.) Applications of Data Mining in Computer Security. Advances in Information Security, vol. 6, pp. 77\u2013101. Springer, Heidelberg (2002)"},{"key":"30_CR12","unstructured":"Combs, G., et al.: Wireshark (2015). http:\/\/www.wireshark.org\/"},{"key":"30_CR13","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"30_CR14","unstructured":"Rapid7 LLC: The metasploit framework (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T18:11:45Z","timestamp":1568571105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}