{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:50Z","timestamp":1725562430484},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_17","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"226-238","source":"Crossref","is-referenced-by-count":4,"title":["Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Xiangyang","family":"Li","sequence":"first","affiliation":[]},{"given":"Nong","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H. Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Computer Networks\u00a031, 805\u2013822 (1999)","journal-title":"Computer Networks"},{"key":"17_CR2","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Wimmer, M., Xu, X.: Incremental clustering for mining in a data warehousing environment. In: Proc 24th VLDB Conference, New York, USA (1998)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proc 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, pp. 120\u2013128 (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"17_CR4","unstructured":"Harsha, S.G., Choudhary, A.: Parallel subspace clustering for very large data sets. Technical Report, CPDC-TR-9906-010. Northwestern University (1999)"},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1109\/83.148613","volume":"1","author":"C. Huang","year":"1992","unstructured":"Huang, C., Bi, Q., Stiles, R., Harris, R.: Fast full search equivalent encoding algorithms for image compression using vector quantization. IEEE Transactions on Image Processing\u00a01(3), 413\u2013416 (1992)","journal-title":"IEEE Transactions on Image Processing"},{"key":"17_CR6","volume-title":"Algorithms for Clustering Data","author":"A.K. Jain","year":"1988","unstructured":"Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice-Hall, Englewood Cliffs (1988)"},{"key":"17_CR7","unstructured":"Lee, W., Stolfo, S.J., Mok, K.: A data mining framework for building intrusion detection models. In: Proc 1999 IEEE Symposium on Security and Privac., pp. 120\u2013132 (1999)"},{"key":"17_CR8","unstructured":"Li, X., Ye, N.: Decision tree classifiers for computer intrusion detection. Journal of Parallel and Distributed Computing Practices\u00a04(2) (2003)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Li, X., Ye, N.: Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection. Quality and Reliability Engineering International\u00a018(3) (2002)","DOI":"10.1002\/qre.477"},{"key":"17_CR10","unstructured":"Mitchell, T.: Machine Learning. WCB\/McGraw-Hill (1997)"},{"key":"17_CR11","volume-title":"Statistical Methods for Quality Improvement","author":"T.P. Ryan","year":"1989","unstructured":"Ryan, T.P.: Statistical Methods for Quality Improvement. John Wiley & Sons, New York (1989)"},{"key":"17_CR12","unstructured":"Sheikholeslami, G., Chatterjee, S., Zhang, A.: WaveCluster: A multi-resolution clustering approach for very large spatial databases. In: Proc 24th VLDB Conference, New York, USA (1998)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Sinclair, C., Pierce, L., Matzner, S.: An application of machine learning to network intrusion detection. In: Proc 15th Annual Computer Security Applications Conference (ACSAC 1999), pp. 371\u2013377 (1999)","DOI":"10.1109\/CSAC.1999.816048"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/3-540-39945-3_6","volume-title":"Recent Advances in Intrusion Detection","author":"A. Valdes","year":"2000","unstructured":"Valdes, A., Skinner, K.: Adaptive, model-based monitoring for cyber attack detection. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, p. 80. Springer, Heidelberg (2000)"},{"key":"17_CR15","unstructured":"Ye, N., Li, X., Emran, S.M.: Decision trees for signature recognition and state classification. In: Proc First IEEE SMC Information Assurance and Security Workshop, pp. 189\u2013194 (2000)"},{"key":"17_CR16","unstructured":"Zhang, T.: Data Clustering for Very Large Datasets plus Applications. Ph.D. Thesis. Department of Computer Science, University of Wisconsin \u2013 Madison (1997)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:31Z","timestamp":1620011911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}