{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T20:10:33Z","timestamp":1739304633939,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540939047"},{"type":"electronic","value":"9783540939054"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-540-93905-4_67","type":"book-chapter","created":{"date-parts":[[2009,8,17]],"date-time":"2009-08-17T16:31:35Z","timestamp":1250526695000},"page":"577-584","source":"Crossref","is-referenced-by-count":0,"title":["Recognizing Anomalies\/Intrusions in Heterogeneous Networks"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","doi-asserted-by":"crossref","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. In: PRIS 2005, pp. 144\u2013153 (2005)","DOI":"10.5220\/0002575201440153"},{"key":"67_CR2","unstructured":"Cheng, C.-M., Kung, H.T., Tan, K.-S.: Use of spectral analysis in defense against DoS attacks. In: IEEE GLOBECOM 2002, pp. 2143\u20132148 (2002)"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: ACM SIGCOMM Internet Measurement Workshop (2002)","DOI":"10.1145\/637209.637210"},{"key":"67_CR4","doi-asserted-by":"crossref","unstructured":"Huang, P., Feldmann, A., Willinger, W.: A non-intrusive, wavelet-based approach to detecting network performance problems. In: ACM SIGCOMM Internet Measurement Workshop (November 2001)","DOI":"10.1145\/505227.505229"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Li, L., Lee, G.: DDos attack detection and wavelets. In: IEEE ICCCN 2003, October 2003, pp. 421\u2013427 (2003)","DOI":"10.1109\/ICCCN.2003.1284203"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescape, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: 2006 IEEE GLOBECOM, San Francisco, CA, USA (November 2006)","DOI":"10.1109\/GLOCOM.2006.279"},{"issue":"12","key":"67_CR7","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1109\/78.258082","volume":"41","author":"S. Mallat","year":"1993","unstructured":"Mallat, S., Zhang: Matching Pursuit with time-frequency dictionaries. IEEE Transactions on Signal Processing\u00a041(12), 3397\u20133415 (1993)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"67_CR8","doi-asserted-by":"crossref","unstructured":"Troop, J.A.: Greed is Good: Algorithmic Results for Sparse Approximation. IEEE Transactions on Information Theory\u00a050(10) (October 2004)","DOI":"10.1109\/TIT.2004.834793"},{"issue":"5","key":"67_CR9","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1109\/78.917803","volume":"49","author":"R. Gribonval","year":"2001","unstructured":"Gribonval, R.: Fast Matching Pursuit with a Multiscale Dictionary of Gaussian Chirps. IEEE Transactions on Signal Processing\u00a049(5) (May 2001)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"67_CR10","unstructured":"Jost, P., Vandergheynst, P., Frossard, P.: Tree-Based Pursuit: Algorithm and Properties. In: Swiss Federal Institute of Technology Lausanne (EPFL), Signal Processing Institute Technical Report. TR-ITS-2005.013 (May 17, 2005)"},{"issue":"4","key":"67_CR11","first-page":"471","volume":"15","author":"T. Andrysiak","year":"2005","unstructured":"Andrysiak, T., Chora\u015b, M.: Image Retrieval Based on Hierarchical Gabor Filters. International Journal Applied Mathematics and Computer Science (AMCS)\u00a015(4), 471\u2013480 (2005)","journal-title":"International Journal Applied Mathematics and Computer Science (AMCS)"},{"key":"67_CR12","first-page":"1435","volume-title":"Proceedings of ICC","author":"A. Dainotti","year":"2007","unstructured":"Dainotti, A., Pescape, A., Ventre, G.: Worm Traffic Analysis and Characterization. In: Proceedings of ICC, pp. 1435\u20131442. IEEE CS Press, Los Alamitos (2007)"},{"key":"67_CR13","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/ICINIS.2008.68","volume-title":"Proc. Intelligent Networks and Intelligent Systems, ICINIS 2008","author":"R. Renk","year":"2008","unstructured":"Renk, R., Saganowski, \u0141., Ho\u0142ubowicz, W., Chora\u015b, M.: Intrusion Detection System Based on Matching Pursuit. In: Proc. Intelligent Networks and Intelligent Systems, ICINIS 2008, pp. 213\u2013216. IEEE CS Press, Los Alamitos (2008)"},{"issue":"4","key":"67_CR14","doi-asserted-by":"crossref","first-page":"18","DOI":"10.22266\/ijies2008.1231.03","volume":"1","author":"\u0141.. Saganowski","year":"2008","unstructured":"Saganowski, \u0141., Chora\u015b, M., Renk, R., Ho\u0142ubowicz, W.: Signal-based Approach to Anomaly Detection in IDS Systems. International Journal of Intelligent Engineering and Systems\u00a01(4), 18\u201324 (2008)","journal-title":"International Journal of Intelligent Engineering and Systems"},{"key":"67_CR15","unstructured":"http:\/\/www.grid.unina.it\/Traffic\/Traces\/ttraces.php"}],"container-title":["Advances in Intelligent and Soft Computing","Computer Recognition Systems 3"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-93905-4_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T19:34:07Z","timestamp":1739302447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-93905-4_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540939047","9783540939054"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-93905-4_67","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}