{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:14:16Z","timestamp":1750997656197,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_46","type":"book-chapter","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:08:03Z","timestamp":1509325683000},"page":"531-541","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of User\u2019s Abnormal Behavior Based on Behavior Sequence in Enterprise Network"],"prefix":"10.1007","author":[{"given":"Haichao","family":"Guan","sequence":"first","affiliation":[]},{"given":"Huakang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guozi","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"46_CR1","unstructured":"Yang, Z.: Analysis of network user behavior based on traffic identification. Chongqing University (2009)"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Farraposo, S., Owezarski, P., Monteiro, P.: A multi-scale tomographic algorithm for detecting and classifying traffic anomalies. In: Proceedings of IEEE International Conference on Communications, pp. 363\u2013370. IEEE Press, Glasgow (2007)","DOI":"10.1109\/ICC.2007.67"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Leland, W.E., Taqqu, M.S., Willinger, W., Wilson, D.V.: On the self-similar nature of Ethernet traffic. In: ACM SIGCOMM Conference, San Francisco, pp. 183\u2013193 (1993)","DOI":"10.1145\/166237.166255"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Psxon, V., Floyd, S.: Wide-area traffic: the failure of Poisson modeling. In: ACM SIGCOMM Conference, San Francisco, pp. 257\u2013268 (1993)","DOI":"10.1145\/190809.190338"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D.: A signal analysis of network traffic anomalies. In: Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, Marseille, pp. 71\u201382 (2002)","DOI":"10.1145\/637201.637210"},{"key":"46_CR6","first-page":"43","volume":"30","author":"XD Xu","year":"2009","unstructured":"Xu, X.D., Zhu, S.R., Sun, Y.M.: Anomaly detection algorithm based on fractal characteristics of large-scale network traffic. J. Commun. 30, 43\u201353 (2009)","journal-title":"J. Commun."},{"key":"46_CR7","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/TNNLS.2016.2544779","volume":"28","author":"B Gu","year":"2016","unstructured":"Gu, B., Sun, X.M., Sheng, V.S.: Structural minimax probability machine. IEEE Trans. Neural Netw. Learn. Syst. 28, 1646\u20131656 (2016)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"46_CR8","first-page":"8","volume":"3","author":"FX Yang","year":"2007","unstructured":"Yang, F.X., Liu, Y.C., Duan, Z.H.: An overview of data cleaning. Appl. Res. Comput. 3, 8\u201311 (2007)","journal-title":"Appl. Res. Comput."},{"key":"46_CR9","first-page":"41","volume":"10","author":"CH Zhang","year":"2007","unstructured":"Zhang, C.H., Kong-Fa, H.U., Chen, L.: Research on sequential pattern mining algorithms. J. Yangzhou Univ. 10, 41\u201346 (2007)","journal-title":"J. Yangzhou Univ."},{"key":"46_CR10","first-page":"44","volume":"2","author":"CL Zheng","year":"2010","unstructured":"Zheng, C.L.: Analysis and implementation of longest common subsequence algorithm. J. Wuyi Coll. 2, 44\u201348 (2010)","journal-title":"J. Wuyi Coll."},{"key":"46_CR11","first-page":"101","volume":"3","author":"HY Yu","year":"2011","unstructured":"Yu, H.Y.: The comparison of the LCS algorithm with the GST algorithm in strings similarity metrics. Electron. Sci. Technol. 3, 101\u2013103 (2011)","journal-title":"Electron. Sci. Technol."},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Fan, D., Stefan, S., Sergej, Z.: Efficient Jaccard-based diversity analysis of large document collections. In: 21st ACM International Conference on Information and Knowledge Management, Maui, pp. 1402\u20131411 (2012)","DOI":"10.1145\/2396761.2398445"},{"key":"46_CR13","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Keng, Y.T., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26, 1403\u20131416 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"46_CR14","first-page":"141","volume":"34","author":"L Pan","year":"2009","unstructured":"Pan, L., Lei, Y., Wang, C., Xie, J.: Method on entity identification using similarity measure based on weight of Jaccard. J. Beijing Jiaotong Univ. 34, 141\u2013145 (2009)","journal-title":"J. Beijing Jiaotong Univ."},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Luo, L., Zhang, K., Xia, Z.: Study on the user behavior of digital library with Cosine Similarity Algorithm. In: IEEE International Symposium on It in Medicine and Education, Xiameng, pp. 369\u2013374 (2008)","DOI":"10.1109\/ITME.2008.4743889"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:52:50Z","timestamp":1750967570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}