{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:55:35Z","timestamp":1746806135640,"version":"3.40.5"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319697802"},{"type":"electronic","value":"9783319697819"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69781-9_13","type":"book-chapter","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T07:13:18Z","timestamp":1510038798000},"page":"128-137","source":"Crossref","is-referenced-by-count":2,"title":["A Hybrid Approach of HTTP Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Yang","family":"Shi","sequence":"first","affiliation":[]},{"given":"Shupei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qinpei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jiangfeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,8]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","volume":"60","author":"S Agrawal","year":"2015","unstructured":"Agrawal, S., Agrawal, J.: Survey on anomaly detection using data mining techniques. Procedia Comput. Sci. 60, 708\u2013713 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"13_CR2","unstructured":"Ahmed, T., Oreshkin, B., Coates, M.: Machine learning approaches to network anomaly detection. In: Proceedings of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, pp. 1\u20136 (2007)"},{"key":"13_CR3","unstructured":"Farid, D., Harbi, N., Rahman, M.: Combining naive bayes and decision tree for adaptive intrusion detection. arXiv preprint \narXiv:1005.4496\n\n (2010)"},{"issue":"3","key":"13_CR4","first-page":"345","volume":"19","author":"S Gaddam","year":"2007","unstructured":"Gaddam, S., Phoha, V., Balagani, K.: K-Means+ ID3: a novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods. TKDE 19(3), 345\u2013354 (2007)","journal-title":"TKDE"},{"issue":"2","key":"13_CR5","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/1132026.1132027","volume":"24","author":"D Moore","year":"2006","unstructured":"Moore, D., Shannon, C., Brown, D., Voelker, G., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115\u2013139 (2006)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"13_CR6","unstructured":"Munson, A., Caruana, R.: Cluster ensembles for network anomaly detection. Technical report, Cornell University (2006)"},{"key":"13_CR7","unstructured":"Nachenberg, C., Wilhelm, J., Wright, A., Faloutsos, C.: Polonium: tera-scale graph mining and inference for malware detection (2011)"},{"issue":"1","key":"13_CR8","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S Peddabachigari","year":"2007","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1), 114\u2013132 (2007)","journal-title":"J. Netw. Comput. Appl."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Collective opinion spam detection: bridging review networks and metadata. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985\u2013994 (2015)","DOI":"10.1145\/2783258.2783370"},{"issue":"1","key":"13_CR10","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11227-009-0338-x","volume":"53","author":"Y Yasami","year":"2010","unstructured":"Yasami, Y., Mozaffari, S.: A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods. J. Supercomput. 53(1), 231\u2013245 (2010)","journal-title":"J. Supercomput."}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69781-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T07:16:59Z","timestamp":1510039019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69781-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319697802","9783319697819"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69781-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}