{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:10:12Z","timestamp":1737349812366,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717027"},{"type":"electronic","value":"9783540717034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71703-4_14","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T00:31:22Z","timestamp":1186014682000},"page":"140-151","source":"Crossref","is-referenced-by-count":4,"title":["A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Jungsuk","family":"Song","sequence":"first","affiliation":[]},{"given":"Hiroki","family":"Takakura","sequence":"additional","affiliation":[]},{"given":"Yasuo","family":"Okabe","sequence":"additional","affiliation":[]},{"given":"Yongjin","family":"Kwon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"133","volume-title":"1999 IEEE Symposium on Security and Privacy","author":"C. Warrender","year":"1999","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion detection model. IEEE Transactions on Software Engineering\u00a013, 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"14_CR3","unstructured":"Javitz, H.S., Valdes, A.: The NIDES statistical component: description and justification. In: Technical Report, Computer Science Laboratory, SRI International (1993)"},{"key":"14_CR4","volume-title":"Cluster Analysis","author":"B. Everitt","year":"2001","unstructured":"Everitt, B., Landau, S., Leese, M.: Cluster Analysis. Arnold, London (2001)"},{"key":"14_CR5","volume-title":"Algorithms for Clustering Data","author":"A. Jain","year":"1988","unstructured":"Jain, A., Dubes, R.: Algorithms for Clustering Data. Prentice-Hall, Englewood Cliffs (1988)"},{"issue":"7","key":"14_CR6","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B. Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J., Shawe-Taylor, J., Smola, A., Williamson, R.: Estimating the support of a high-dimensional distribution. Neural Computation\u00a013(7), 1443\u20131471 (2001)","journal-title":"Neural Computation"},{"key":"14_CR7","unstructured":"McQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297 (1967)"},{"key":"14_CR8","unstructured":"The third international knowledge discovery and data mining tools competition dataset KDD99-Cup (1999), http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"14_CR9","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion Detection with Unlabeled Data Using Clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (2001)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A Geometric Framework for Unsupervised Anomaly Detection: Intrusion Detection in Unlabeled Data. In: Applications of Data Mining in Computer Security (2002)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Guan, Y., Ghorbani, A., Belacel, N.: Y-means: A Clustering Method for Intrusion Detection. In: IEEE Canadian Conference on Electrical and Computer Engineering, Proceedings (2003)","DOI":"10.1109\/CCECE.2003.1226084"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Laskov, P., Sch\u00e4fer, C., Kotenko, I.: Intrusion detection in unlabeled data with quarter-sphere support vector machines. In: Proc. DIMVA, pp. 71\u201382 (2004)","DOI":"10.1515\/PIKO.2004.228"},{"key":"14_CR13","unstructured":"Leung, K., Leckie, C.: Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. In: Proceedings of Twenty-Eighth Australasian Computer Science Conference, ACSC (2005)"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/1007730.1007731","volume":"6","author":"L. Parsons","year":"2004","unstructured":"Parsons, L., Haque, E., Liu, H.: Subspace clustering for high dimensional data: A review. SIGKDD Explorations\u00a06(1), 90\u2013105 (2004)","journal-title":"SIGKDD Explorations"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P.: Evaluating Intrusion Detection Systems: the 1998 DARPA Off-Line Intrusion Detection Evaluation. In: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, vol.\u00a02 (2000)","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"14_CR16","unstructured":"Ball, G.H., Hall, D.J.: ISODATA, a novel method of data analysis and classification. Tech. Rep. Stanford University, Stanford, CA (1965)"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases: Concepts, Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71703-4_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T02:06:56Z","timestamp":1737338816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71703-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717027","9783540717034"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71703-4_14","relation":{},"subject":[]}}