{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:27:15Z","timestamp":1772112435427,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540228431","type":"print"},{"value":"9783540286486","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28648-6_105","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T19:38:54Z","timestamp":1292873934000},"page":"657-662","source":"Crossref","is-referenced-by-count":20,"title":["A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security"],"prefix":"10.1007","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Xiangliang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"105_CR1","first-page":"130","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"W. Lee","year":"2001","unstructured":"Lee, W., Xiang, D.: Information-Theoretic Measures for Anomaly Detection. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 130\u2013143. IEEE Computer Society Press, Oakland (2001)"},{"key":"105_CR2","unstructured":"Anderson, D., Frivold, T., Valdes, A.: Next-Generation intrusion Detection Expert System (NIDES): A Summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California (1995)"},{"key":"105_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0020-0190(00)00122-8","volume":"76","author":"M. Schonlau","year":"2000","unstructured":"Schonlau, M., Theus, M.: Detecting Masquerades in Intrusion Detection Based on Unpopular Commands. Information Processing Letters\u00a076, 33\u201338 (2000)","journal-title":"Information Processing Letters"},{"key":"105_CR4","first-page":"120","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press, Oakland (1996)"},{"key":"105_CR5","unstructured":"Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the 7th USENIX Security Symposium, Usenix Association, San Antonio, Texas, pp. 79\u201394 (1998)"},{"key":"105_CR6","first-page":"133","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"C. Warrender","year":"1999","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 133\u2013145. IEEE Computer Society Press, Oakland (1999)"},{"key":"105_CR7","first-page":"568","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2004","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn., pp. 568\u2013570. China Machine Press, Beijing (2004)","edition":"2"},{"key":"105_CR8","volume-title":"Principal Component Analysis","author":"I.T. Jolliffe","year":"2002","unstructured":"Jolliffe, I.T.: Principal Component Analysis, 2nd edn. Springer, New York (2002)","edition":"2"},{"issue":"1","key":"105_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M. Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for Recognition. Journal of Cognitive Neuroscience\u00a03(1), 71\u201386 (1991)","journal-title":"Journal of Cognitive Neuroscience"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28648-6_105.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:31:50Z","timestamp":1620012710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28648-6_105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540228431","9783540286486"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28648-6_105","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}