{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T18:40:07Z","timestamp":1750963207753,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319684444"},{"type":"electronic","value":"9783319684451"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68445-1_15","type":"book-chapter","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:40:36Z","timestamp":1508805636000},"page":"127-134","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly Detection in Network Traffic with a Relationnal Clustering Criterion"],"prefix":"10.1007","author":[{"given":"Damien","family":"Nogues","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,24]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Abe, N., Zadrozny, B., Langford, J.: Outlier detection by active learning. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 504\u2013509. ACM (2006)","DOI":"10.1145\/1150402.1150459"},{"issue":"1847","key":"15_CR2","first-page":"536","volume":"25","author":"A Cauchy","year":"1847","unstructured":"Cauchy, A.: M\u00e9thode g\u00e9n\u00e9rale pour la r\u00e9solution des systemes d\u2019\u00e9quations simultan\u00e9es. Comptes rendus hebdomadaires des s\u00e9ances de l\u2019Acad\u00e9mie des sciences 25(1847), 536\u2013538 (1847)","journal-title":"Comptes rendus hebdomadaires des s\u00e9ances de l\u2019Acad\u00e9mie des sciences"},{"issue":"1","key":"15_CR3","first-page":"61","volume":"34","author":"S Chah","year":"1986","unstructured":"Chah, S.: Comparaisons par triplets en classification automatique. Revue de statistique appliqu\u00e9e 34(1), 61\u201379 (1986)","journal-title":"Revue de statistique appliqu\u00e9e"},{"issue":"3","key":"15_CR4","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"15_CR5","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4615-0953-0_4","volume-title":"Applications of Data Mining in Computer Security","author":"E Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection. In: Barbar\u00e1, D., Jajodia, S. (eds.) Applications of Data Mining in Computer Security. ADIS, vol. 6, pp. 77\u2013101. Springer, Heidelberg (2002). doi: 10.1007\/978-1-4615-0953-0_4"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Gao, J., Hu, W., Li, W., Zhang, Z., Wu, O.: Local outlier detection based on kernel regression. In: 2010 20th International Conference on Pattern Recognition (ICPR), pp. 585\u2013588. IEEE (2010)","DOI":"10.1109\/ICPR.2010.148"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-20847-8_23","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J Gao","year":"2011","unstructured":"Gao, J., Hu, W., Zhang, Z.M., Zhang, X., Wu, O.: RKOF: robust kernel-based local outlier detection. In: Huang, J.Z., Cao, L., Srivastava, J. (eds.) PAKDD 2011. LNCS, vol. 6635, pp. 270\u2013283. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20847-8_23"},{"key":"15_CR8","unstructured":"Handley, M., Paxson, V., Kreibich, C.: Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In: USENIX Security Symposium, pp. 115\u2013131 (2001)"},{"key":"15_CR9","unstructured":"Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-Eighth Australasian Conference on Computer Science, vol. 38, pp. 333\u2013342. Australian Computer Society Inc. (2005)"},{"key":"15_CR10","unstructured":"Lichman, M.: UCI machine learning repository (2013)"},{"key":"15_CR11","volume-title":"Optimisation en analyse ordinale des donn\u00e9es","author":"J-F Marcotorchino","year":"1979","unstructured":"Marcotorchino, J.-F., Michaud, P.: Optimisation en analyse ordinale des donn\u00e9es. Masson, Paris (1979)"},{"key":"15_CR12","first-page":"395","volume":"43","author":"J-F Marcotorchino","year":"1981","unstructured":"Marcotorchino, J.-F., Michaud, P.: Heuristic approach of the similarity aggregation problem. Methods Oper. Res. 43, 395\u2013404 (1981)","journal-title":"Methods Oper. Res."},{"key":"15_CR13","unstructured":"Nogues, D.: Method for unsupervised classification of a plurality of objects and device for unsupervised classification associated with said method, EP Patent App. EP20,140,200,529 (2015)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-540-24775-3_33","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J Oldmeadow","year":"2004","unstructured":"Oldmeadow, J., Ravinutala, S., Leckie, C.: Adaptive clustering for network intrusion detection. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS, vol. 3056, pp. 255\u2013259. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24775-3_33"},{"key":"15_CR15","first-page":"801","volume":"4","author":"H Steinhaus","year":"1956","unstructured":"Steinhaus, H.: Sur la division des corps mat\u00e9riels en parties. Bull. Acad. Polon. Sci. Cl. III 4, 801\u2013804 (1956)","journal-title":"Bull. Acad. Polon. Sci. Cl. III"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Yang, J., Zhong, N., Yao, Y., Wang, J.: Local peculiarity factor and its application in outlier detection. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008, New York, NY, USA, pp. 776\u2013784. ACM (2008)","DOI":"10.1145\/1401890.1401983"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297\u2013300. IEEE (2010)","DOI":"10.1109\/BWCCA.2010.85"}],"container-title":["Lecture Notes in Computer Science","Geometric Science of Information"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68445-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T18:04:04Z","timestamp":1750961044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68445-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319684444","9783319684451"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68445-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}