{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:46Z","timestamp":1740099046160,"version":"3.37.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319752136"},{"type":"electronic","value":"9783319752143"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75214-3_21","type":"book-chapter","created":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T14:33:29Z","timestamp":1516890809000},"page":"219-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Anomaly Detection Model in a LAN Using K-NN and High Performance Computing Techniques"],"prefix":"10.1007","author":[{"given":"Mercedes","family":"Barrionuevo","sequence":"first","affiliation":[]},{"given":"Mariela","family":"Lopresti","sequence":"additional","affiliation":[]},{"given":"Natalia","family":"Miranda","sequence":"additional","affiliation":[]},{"given":"Fabiana","family":"Piccoli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,26]]},"reference":[{"key":"21_CR1","unstructured":"Barrionuevo, M., Lopresti, M., Miranda, N., Piccoli, M.: Un enfoque para la detecci\u00f3n de anomal\u00edas en el tr\u00e1fico de red usando im\u00e1genes y t\u00e9cnicas de computaci\u00f3n de alto desempe\u00f1o. In: XXII Congreso Argentino de Ciencias de la Computaci\u00f3n, CACIC 2016, pp. 1166\u20131175 (2016)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: ICML 2006: Proceedings of the 23rd International Conference on Machine Learning, New York, NY, USA, pp. 233\u2013240. ACM (2006)","DOI":"10.1145\/1143844.1143874"},{"key":"21_CR3","unstructured":"Gibson, D.: CompTIA Security+: Get Certified Get Ahead: SY0-201 Study Guide Createspace Independent Pub (2009). ISBN 9781439236369"},{"key":"21_CR4","unstructured":"Henao R\u00edos, J.L.: Definici\u00f3n De Un Modelo De Seguridad En Redes De C\u00f3mputo, Mediante El Uso De T\u00e9cnicas De Inteligencia Artificial. Tesis presentada como requisito parcial para optar al t\u00edtulo de Mag\u00edster en Ingenier\u00eda \u2013 Automatizaci\u00f3n Industrial, Universidad Nacional de Colombia (2012)"},{"key":"21_CR5","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D Lowe","year":"2004","unstructured":"Lowe, D.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60, 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"key":"21_CR6","unstructured":"Miranda, N.: C\u00e1lculo en Tiempo Real de Identificadores Robustos para Objetos Multimedia Mediante una Arquitectura Paralela GPU-CPU, Tesis de Doctorado en Ciencias de la Computaci\u00f3n, UNSL (2014)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Piccoli, M.F.: Computaci\u00f3n de alto desempe\u00f1o de GPU. 1era edic, La Plata Edulp (2011). ISBN 9789503407592","DOI":"10.35537\/10915\/18404"},{"key":"21_CR8","unstructured":"S. Institute: Transmission Control Protocol: DARPA Internet Program Protocol Specification. Defense Advanced Research Projects Agency, Information Processing Techniques Office (1981)"},{"key":"21_CR9","unstructured":"Tribak, H.: An\u00e1lisis Estad\u00edstico de Distintas T\u00e9cnicas de Inteligencia Artificial en Detecci\u00f3n de Intrusos. Tesis Doctoral, Universidad de Granada (2012)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Y.: Statistical techniques for network security: modern statistically-based intrusion detection and protection. In: Network Traffic and Data, Information Science Reference - Imprint of: IGI Publishing (2008)","DOI":"10.4018\/978-1-59904-708-9"}],"container-title":["Communications in Computer and Information Science","Computer Science \u2013 CACIC 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75214-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T05:42:31Z","timestamp":1660369351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75214-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319752136","9783319752143"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75214-3_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}