{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T05:06:09Z","timestamp":1740287169674,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201267"},{"type":"electronic","value":"9783540398783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39878-3_27","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T22:39:03Z","timestamp":1277332743000},"page":"342-353","source":"Crossref","is-referenced-by-count":5,"title":["Dependability and Survivability of Large Complex Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Sandro","family":"Bologna","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Balducelli","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Dipoppa","sequence":"additional","affiliation":[]},{"given":"Giordano","family":"Vicoli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A.: \u2018Detecting Unusual Program Behaviour Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES) SRI International technical report, SRI-CSL-95-06 (May 1995)"},{"key":"27_CR2","unstructured":"Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection using Autonomous Agents, COAST Technical Report 98\/ 05, June 11 (1998)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Neumann, P.G.: Practical Architectures for Survivable Systems and Networks, SRI Report (2000)","DOI":"10.21236\/ADA368944"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Stillerman, M., Marceau, C., Stillman, M.: Intrusion Detection Distributed. Communications of the ACM\u00a042(7) (July 1999)","DOI":"10.1145\/306549.306577"},{"key":"27_CR5","volume-title":"Power Generation, Operation and Control","author":"A.J. Wood","year":"1996","unstructured":"Wood, A.J., Wollenberg, B.F.: Power Generation, Operation and Control, 2nd edn. John Wiley & Sons, Inc., New York (1996)","edition":"2"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Thompson, B.B., Marks II, R.J., Choi, J.J., El-Sharkawi, M.A., Huang, M.Y., Bunje, C.: Implicit Learning in Autoencoder Novelty Asssement. In: Proceedings of the 2002 International Joint Conference on Neural Networks, 2002 IEEE World Congress on Computational Intelligence, Honolulu, May 12-17, pp. 2878\u20132883 (2002)","DOI":"10.1109\/IJCNN.2002.1007605"},{"issue":"1","key":"27_CR7","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/AIC-1994-7104","volume":"7","author":"A. Aamodt","year":"1994","unstructured":"Aamodt, A., Plaza, E.: Case Based Reasoning: Fundamental Issues, Methodological Variation, and System Approaches. AI Communications\u00a07(1), 39\u201359 (1994)","journal-title":"AI Communications"},{"key":"27_CR8","first-page":"347","volume-title":"Proceedings of the First International Conference on Case-Based Reasoning","author":"D. Wettschereck","year":"1995","unstructured":"Wettschereck, D., Aha, D.W.: Weighting features. In: Proceedings of the First International Conference on Case-Based Reasoning, Lisbon, Portugal, pp. 347\u2013358. Springer, Heidelberg (1995)"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1162\/neco.1995.7.1.72","volume":"7","author":"D.G. Lowe","year":"1995","unstructured":"Lowe, D.G.: Similarity metric learning for a variable-kernel classifier. Neural Computation\u00a07, 72\u201385 (1995)","journal-title":"Neural Computation"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Ricci, F., Avesani, P.: Learning an asymmetric and anisotropic similarity metric for Case-Based Reasoning. AI Review: Special Issue on Lazy Learning (April 1995)","DOI":"10.1007\/3-540-60598-3_27"},{"key":"27_CR11","unstructured":"Balducelli, C., Brusoni, F.: A CBR tool to simulate diagnostic Case-Based operator models. In: Proceedings of ESS96 European Simulation Symposium and Exhibition, Genoa, Italy, October 24\u201326 (1996)"},{"key":"27_CR12","volume-title":"Data Mining","author":"H. Witten","year":"2000","unstructured":"Witten, H., Frank, E.: Data Mining. Morgan Kaufmann Publishers, San Francisco (2000)"},{"key":"27_CR13","unstructured":"Weka Data Miner, http:\/\/www.cs.waikato.ac.nz\/ml\/weka"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1022631118932","volume":"11","author":"R.C. Holte","year":"1993","unstructured":"Holte, R.C.: Very simple classification rules perform well on most data commonly used datasets. Machine Learning\u00a011, 63\u201391 (1993)","journal-title":"Machine Learning"},{"key":"27_CR15","volume-title":"Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"27_CR16","first-page":"399","volume-title":"Proc. of 10th Conference on Uncertainty in Artificial Intelligence","author":"P. Langley","year":"1994","unstructured":"Langley, P., Sage, S.: Induction on selective Bayesian classifiers. In: Proc. of 10th Conference on Uncertainty in Artificial Intelligence, Seattle, WA USA, pp. 399\u2013406. Morgan Kauffmann, San Francisco (1994)"},{"issue":"3","key":"27_CR17","first-page":"197","volume":"20","author":"D. Heckermann","year":"1995","unstructured":"Heckermann, D., Geiger, D., Chickering, D.M.: Learning Bayesian Networks: The combination of Knowledge and statistical data. Machine Learning\u00a020(3), 197\u2013243 (1995)","journal-title":"Machine Learning"},{"issue":"2","key":"27_CR18","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0020-7373(92)90018-G","volume":"36","author":"D. Aha","year":"1992","unstructured":"Aha, D.: Tolerating noisy, irrelevant and novel attributes in instance-based learning algorithms. International Journal of Man-Machine Studies\u00a036(2), 267\u2013287 (1992)","journal-title":"International Journal of Man-Machine Studies"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"D.H. Wolpert","year":"1992","unstructured":"Wolpert, D.H.: Stacked Generalization. Neural Networks\u00a05, 241\u2013259 (1992)","journal-title":"Neural Networks"},{"key":"27_CR20","volume-title":"Introduction to the theory of Neural Computation","author":"J. Hertz","year":"1991","unstructured":"Hertz, J., Krogh, A., Palmer, R.G.: Introduction to the theory of Neural Computation. Addison-Wesley Publishing Company, Reading (1991)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Carpenter, G., Grossberg, S., Reynolds, J.: ARTMAP: Supervised Real-Time Learning and Classification of Nonstationary Date by a Self-Organizing Neural Network. Neural Networks 4, 565 (1991), Lars Liden, ftp:\/\/cns-ftp.bu.edu\/pub\/ART_GALLERY\/Unix\/unix_gal.tar, laliden@cns.bu.edu","DOI":"10.1016\/0893-6080(91)90012-T"},{"key":"27_CR22","unstructured":"Tveter, D.R., http:\/\/www.mcs.com\/~drt\/home.html , drt@mcs.com"},{"key":"27_CR23","unstructured":"Schneier, B.: Attack Trees: Modeling Security Threats. Dr. Dobb\u2019s Journal (December 1999) ISSN 1044-789X"},{"key":"27_CR24","unstructured":"Bigham, J., Gamez, D., Lu, N.: Safeguarding SCADA Systems with Anomaly Detection Department of Electronic Engineering, Queen Mary, University of London, London, E1 4NS, UK"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39878-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T06:02:25Z","timestamp":1740204145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39878-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201267","9783540398783"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39878-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}