{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:50:45Z","timestamp":1772905845018,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540693833","type":"print"},{"value":"9783540693840","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69384-0_45","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T02:39:15Z","timestamp":1217471955000},"page":"396-404","source":"Crossref","is-referenced-by-count":8,"title":["Reducing False Alarm Rate in Anomaly Detection with Layered Filtering"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Pokrywka","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/11758532_111","volume-title":"Computational Science \u2013 ICCS 2006","author":"K. Cetnarowicz","year":"2006","unstructured":"Cetnarowicz, K., Rojek, G., Pokrywka, R.: Intelligent Agents as Cells of Immunological Memory. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol.\u00a03993, pp. 855\u2013862. Springer, Heidelberg (2006)"},{"key":"45_CR2","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S. Axelsson","year":"2000","unstructured":"Axelsson, S.: The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Trans. Inf. Syst. Secur.\u00a03, 186\u2013205 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Perlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Klautau, A., Jevtic, N., Orlitsky, A.: Combined Binary Classifiers with Applications to Speech Recognition. In: International Conference on Spoken Language Processing 2002, pp. 2469\u20132472 (2002)","DOI":"10.21437\/ICSLP.2002-643"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2008"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69384-0_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T07:30:00Z","timestamp":1684481400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69384-0_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540693833","9783540693840"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69384-0_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}