{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:46:05Z","timestamp":1725518765536},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874027"},{"type":"electronic","value":"9783540874034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87403-4_23","type":"book-chapter","created":{"date-parts":[[2008,9,17]],"date-time":"2008-09-17T07:42:05Z","timestamp":1221637325000},"page":"394-395","source":"Crossref","is-referenced-by-count":6,"title":["Evading Anomaly Detection through Variance Injection Attacks on PCA"],"prefix":"10.1007","author":[{"given":"Benjamin I. P.","family":"Rubinstein","sequence":"first","affiliation":[]},{"given":"Blaine","family":"Nelson","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Anthony D.","family":"Joseph","sequence":"additional","affiliation":[]},{"given":"Shing-hon","family":"Lau","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Taft","sequence":"additional","affiliation":[]},{"given":"J. D.","family":"Tygar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Technical Report UCB\/EECS-2008-43, UC Berkeley (April 2008)","DOI":"10.21236\/ADA519143"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: Proc. SIGCOMM 2004, pp. 219\u2013230 (2004)","DOI":"10.1145\/1015467.1015492"},{"key":"23_CR3","unstructured":"Rubinstein, B.I.P., Nelson, B., Huang, L., Joseph, A.D., Lau, S., Taft, N., Tygar, J.D.: Compromising PCA-based anomaly detectors for network-wide traffic. Technical report UCB\/EECS-2008-73, UC Berkeley (May 2008)"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87403-4_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:37:28Z","timestamp":1606167448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87403-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874027","9783540874034"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87403-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}