{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:26Z","timestamp":1725558686283},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_19","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"217-229","source":"Crossref","is-referenced-by-count":1,"title":["Model Redundancy vs. Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Zhuowei","family":"Li","sequence":"first","affiliation":[]},{"given":"Amitabha","family":"Das","sequence":"additional","affiliation":[]},{"given":"Sabu","family":"Emmanuel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7\u20138","key":"19_CR1","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BF02994844","volume":"55","author":"H. Debar","year":"2000","unstructured":"Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion detection systems. Annales des Telecommunications\u00a055(7\u20138), 361\u2013378 (2000)","journal-title":"Annales des Telecommunications"},{"issue":"4","key":"19_CR2","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for contructing features and models for intrusion detection systems. ACM Transactions on Information and System Security\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"Li, Z., Das, A.: Unifying anomaly-based and signature-based intrusion detection. Technical Report CAIS-TR-2004-005, CAIS (August 2004)","key":"19_CR3","DOI":"10.1007\/11430919_81"},{"doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks. In: SIGKDD 2002, July 23\u201326 (2002)","key":"19_CR4","DOI":"10.1145\/775047.775102"},{"issue":"4","key":"19_CR5","first-page":"1","volume":"1","author":"S. Mukkamala","year":"2003","unstructured":"Mukkamala, S., Sung, A.H.: Identifying significant features for network forensic analysis using artificial intelligent techniques. International Journal of Digital Evidence\u00a01(4), 1\u201317, Winter (2003)","journal-title":"International Journal of Digital Evidence"},{"doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 255\u2013264 (2002)","key":"19_CR6","DOI":"10.1145\/586110.586145"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T12:07:19Z","timestamp":1635595639000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}