{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:54:20Z","timestamp":1725512060904},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717003"},{"type":"electronic","value":"9783540717010"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71701-0_80","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T15:31:38Z","timestamp":1182353498000},"page":"737-744","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly Intrusion Detection Based on Dynamic Cluster Updating"],"prefix":"10.1007","author":[{"given":"Sang-Hyun","family":"Oh","sequence":"first","affiliation":[]},{"given":"Won-Suk","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","unstructured":"Javitz, H.S., Valdes, A.: The NIDES Statistical Component Description and Justification. Annual report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025 (March 1994)"},{"key":"80_CR2","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: 20th NISSC (October 1997)"},{"key":"80_CR3","volume-title":"Proc. of the 1991 IEEE Symposium on Research in Security and Privacy","author":"H.S. Javitz","year":"1991","unstructured":"Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, May 1991, IEEE Computer Society Press, Los Alamitos (1991)"},{"key":"80_CR4","doi-asserted-by":"crossref","unstructured":"Ester, M., et al.: Incremental Clustering for Mining in a Data Warehousing Environment. In: Proceedings of the 24th VLDB Conference, New York, USA (1998)","DOI":"10.1007\/BFb0100982"},{"issue":"8","key":"80_CR5","first-page":"2086","volume":"E87-D","author":"S.-H. Oh","year":"2004","unstructured":"Oh, S.-H., Lee, W.-S.: A Clustering-Based Anomaly Intrusion Detector for a Host Computer. IEICE Trans. on Information and Systems\u00a0E87-D(8), 2086\u20132094 (2004)","journal-title":"IEICE Trans. on Information and Systems"},{"key":"80_CR6","unstructured":"Sun Microsystems. SunShield Basic Security Module Guide"},{"key":"80_CR7","unstructured":"http:\/\/www.ll.mit.edu\/IST\/ideval\/index.html"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71701-0_80.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:25:42Z","timestamp":1605763542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71701-0_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717003","9783540717010"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71701-0_80","relation":{},"subject":[]}}