{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:15:15Z","timestamp":1726409715590},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_9","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T19:15:06Z","timestamp":1188328506000},"page":"94-103","source":"Crossref","is-referenced-by-count":0,"title":["An Attack Classification Mechanism Based on Multiple Support Vector Machines"],"prefix":"10.1007","author":[{"given":"Jungtaek","family":"Seo","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2000.839316","volume":"33","author":"L. Garber","year":"2000","unstructured":"Garber, L.: Denial-of-service attacks rip the internet. IEEE Computer\u00a033(4), 12\u201317 (2000)","journal-title":"IEEE Computer"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. In: Proceedings of the 10th , pp. 9\u201322 (2001)","DOI":"10.21236\/ADA400003"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Gil, T., Poletto, M.: MULTOPS: a data-structure for bandwidth attack detection. In: Proceedings of the 10th USENIX Security Symposium, pp. 23\u201338 (2001)","DOI":"10.21236\/ADA401819"},{"key":"9_CR4","volume-title":"Proceedings of the IEEE Infocom 2002, New York City, NY","author":"H. Wang","year":"2002","unstructured":"Wang, H., Zhang, D., Shin, K.G.: Detecting SYN flooding attacks. In: Proceedings of the IEEE Infocom 2002, New York City, NY, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-540-24591-9_10","volume-title":"Information Security Applications","author":"D.S. Choi","year":"2004","unstructured":"Choi, D.S., Im, E.G., Lee, C.W.: Intrusion-tolerant system design for web server survivability. In: Chae, K.-J., Yung, M. (eds.) Information Security Applications. LNCS, vol.\u00a02908, pp. 124\u2013134. Springer, Heidelberg (2004)"},{"key":"9_CR6","unstructured":"Anderson, D.: Detecting unusual program behavior using the statistical component of the next-generation intrusion detection. Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International (1995)"},{"key":"9_CR7","unstructured":"Cabrera, J.B.D.: Statistical traffic modeling for net work intrusion detection. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (2000)"},{"key":"9_CR8","unstructured":"Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection (2001)"},{"key":"9_CR9","volume-title":"Next Generation Data Mining","author":"L. Ertoz","year":"2004","unstructured":"Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P.: Next Generation Data Mining. MIT Press, Cambridge (2004)"},{"issue":"1-2","key":"9_CR10","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","volume":"10","author":"S. Staniford","year":"2002","unstructured":"Staniford, S., Hoagland, J., McAlerney, J.: Practical automated detection of stealthy portscans. Journal of Computer Security\u00a010(1-2), 105\u2013136 (2002)","journal-title":"Journal of Computer Security"},{"key":"9_CR11","volume-title":"Proceedings of the ACM SIGMOD Conference","author":"S. Ramaswamy","year":"2000","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the ACM SIGMOD Conference, ACM Press, New York (2000)"},{"key":"9_CR12","unstructured":"(\n                    \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.htm\n                    \n                    \n                  )"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:32:38Z","timestamp":1619519558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_9","relation":{},"subject":[]}}