{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T05:28:57Z","timestamp":1738992537291,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642003059"},{"type":"electronic","value":"9783642003066"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00306-6_14","type":"book-chapter","created":{"date-parts":[[2009,2,17]],"date-time":"2009-02-17T11:15:44Z","timestamp":1234869344000},"page":"190-200","source":"Crossref","is-referenced-by-count":0,"title":["A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model"],"prefix":"10.1007","author":[{"given":"Sooyoung","family":"Chae","sequence":"first","affiliation":[]},{"given":"Hosub","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jaeik","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Manhyun","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Jongin","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Jongsub","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Aguirre, S.J., Hill, W.H.: Intrusion Detection Fly-Off: Implications for the United States Navy, MITRE Technical Report 97W0000096 (1997)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/52.605930","volume":"14","author":"N. Puketza","year":"1997","unstructured":"Puketza, N., Chung, M., Olsson, R.A., Mukherjee, B.: A software platform for testing intrusion detection systems. IEEE Software\u00a014, 43\u201351 (1997)","journal-title":"IEEE Software"},{"key":"14_CR3","unstructured":"Haines, J.W., Laboratory, L.: 1999 DARPA intrusion detection evaluation: design and procedures, Massachusetts Institute of Technology, Lincoln Laboratory, Lexington, Mass (2001)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-39945-3_11","volume-title":"Recent Advances in Intrusion Detection","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J., Fried, D.J., Korba, J., Das, K.: Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 162\u2013182. Springer, Heidelberg (2000)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks\u00a034, 579\u2013595 (2000)","journal-title":"Computer Networks"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K.: Evaluating intrusion detection systems: the 1998 DARPA off-lineintrusion detection evaluation. In: DARPA Information Survivability Conference and Exposition 2 (2000)","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/306549.306571","volume":"42","author":"R. Durst","year":"1999","unstructured":"Durst, R., Champion, T., Witten, B., Miller, E., Spagnuolo, L.: Testing and evaluating computer intrusion detection systems. Communications of the ACM\u00a042, 53\u201361 (1999)","journal-title":"Communications of the ACM"},{"key":"14_CR8","first-page":"45","volume":"20","author":"P. Mueller","year":"2001","unstructured":"Mueller, P., Shipley, G.: Dragon claws its way to the top. Network Computing\u00a020, 45\u201367 (2001)","journal-title":"Network Computing"},{"key":"14_CR9","unstructured":"Wood, S.N.: The mgcv Package (2007), http:\/\/cran.r-project.org\/doc\/packages\/mgcv.pdf"},{"key":"14_CR10","volume-title":"Linear Models With R","author":"J.J. Faraway","year":"2005","unstructured":"Faraway, J.J.: Linear Models With R. CRC Press, Boca Raton (2005)"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1214\/ss\/1177013604","volume":"1","author":"T. Hastie","year":"1986","unstructured":"Hastie, T., Tibshirani, R.: Generalized Additive Models. Statistical Science\u00a01, 297\u2013310 (1986)","journal-title":"Statistical Science"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1080\/01621459.1987.10478440","volume":"82","author":"T. Hastie","year":"1987","unstructured":"Hastie, T., Tibshirani, R.: Generalized Additive Models: Some Applications. Journal of the American Statistical Association\u00a082, 371\u2013386 (1987)","journal-title":"Journal of the American Statistical Association"},{"key":"14_CR13","volume-title":"Generalized additive models","author":"T. Hastie","year":"1990","unstructured":"Hastie, T., Tibshirani, R.: Generalized additive models. Chapman and Hall\/CRC, Boca Raton (1990)"},{"key":"14_CR14","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010404","volume-title":"Generalized additive models : an introduction with R","author":"S.N. Wood","year":"2006","unstructured":"Wood, S.N.: Generalized additive models: an introduction with R. Chapman and Hall\/CRC, Boca Raton (2006)"},{"key":"14_CR15","unstructured":"Xiang, D.: Fitting Generalized Additive Models with the GAM Procedure, SAS Institute Paper P 256 (2001)"},{"key":"14_CR16","unstructured":"Stolfo, S.: KDD-CUP-99 Task Description, http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.html"},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C. Elkan","year":"2000","unstructured":"Elkan, C.: Results of the KDD 1999 classifier learning. ACM SIGKDD Explorations Newsletter\u00a01, 63\u201364 (2000)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"14_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/0470055464","volume-title":"Regression Analysis by Example","author":"S. Chatterjee","year":"2006","unstructured":"Chatterjee, S., Hadi, A.S.: Regression Analysis by Example, 4th edn. Wiley-Interscience, Hoboken (2006)","edition":"4"},{"key":"14_CR19","volume-title":"Computer Networks","author":"A.S. Tanenbaum","year":"2002","unstructured":"Tanenbaum, A.S.: Computer Networks. Prentice Hall PTR, Englewood Cliffs (2002)"},{"key":"14_CR20","volume-title":"TCP\/IP Illustrated","author":"W.R. Stevens","year":"1995","unstructured":"Stevens, W.R.: TCP\/IP Illustrated, vol.\u00a0I. Addison-Wesley Publishing Company, Reading (1995)"},{"key":"14_CR21","volume-title":"Computer networking : a top-down approach featuring the Internet","author":"J.F. Kurose","year":"2005","unstructured":"Kurose, J.F., Ross, K.W.: Computer networking: a top-down approach featuring the Internet. Pearson\/Addison Wesley, Boston (2005)"},{"key":"14_CR22","unstructured":"Weisstein, E.W.: Gamma Distribution,WolframMathWorld (2005), http:\/\/mathworld.wolfram.com\/GammaDistribution.html"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Jin, S., Yeung, D.S.: A covariance analysis model for DDoS attack detection. In: 2004 IEEE International Conference on Communications, vol.\u00a04, pp. 1882\u20131886 (2004)","DOI":"10.1109\/ICC.2004.1312847"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11590354_7","volume-title":"Grid and Cooperative Computing - GCC 2005","author":"J. Seo","year":"2005","unstructured":"Seo, J., Lee, C., Shon, T., Moon, J.: SVM approach with CTNT to detect DDoS attacks in grid computing. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol.\u00a03795, pp. 59\u201370. Springer, Heidelberg (2005)"},{"key":"14_CR25","first-page":"1890","volume-title":"INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Z. Chen","year":"2003","unstructured":"Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a03, pp. 1890\u20131900. IEEE, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00306-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T19:24:22Z","timestamp":1738956262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00306-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642003059","9783642003066"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00306-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}