{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:47:35Z","timestamp":1742917655636,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041792"},{"type":"electronic","value":"9783642041808"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04180-8_62","type":"book-chapter","created":{"date-parts":[[2009,8,27]],"date-time":"2009-08-27T08:11:20Z","timestamp":1251360680000},"page":"692-704","source":"Crossref","is-referenced-by-count":3,"title":["Feature Selection for Density Level-Sets"],"prefix":"10.1007","author":[{"given":"Marius","family":"Kloft","sequence":"first","affiliation":[]},{"given":"Shinichi","family":"Nakajima","sequence":"additional","affiliation":[]},{"given":"Ulf","family":"Brefeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Bach, F.R., Lanckriet, G.R.G., Jordan, M.I.: Multiple kernel learning, conic duality, and the SMO algorithm. In: Proceedings of the Twenty-first International Conference on Machine Learning (2004)","key":"62_CR1","DOI":"10.1145\/1015330.1015424"},{"key":"62_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S. Boyd","year":"2004","unstructured":"Boyd, S., Vandenberghe, L.: Convex Optimization. Cambrigde University Press, Cambridge (2004)"},{"unstructured":"Chapelle, O., Rakotomamonjy, A.: Second order optimization of kernel parameters. In: Proceedings of the NIPS Workshop on Kernel Learning: Automatic Selection of Optimal Kernels (2008)","key":"62_CR3"},{"doi-asserted-by":"crossref","unstructured":"Chhabra, P., Scott, C., Kolaczyk, E.D., Crovella, M.: Distributed spatial anomaly detection. In: Proceedings of the IEEE Infocom 2008 (2008)","key":"62_CR4","DOI":"10.1109\/INFOCOM.2007.232"},{"unstructured":"Csurka, G., Bray, C., Dance, C., Fan, L.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, Prague, Czech Republic, May 2004, pp. 1\u201322 (2004)","key":"62_CR5"},{"doi-asserted-by":"crossref","unstructured":"Dalal, N., Triggs, B.: Histograms of oriented gradientsfor human detection. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Diego, USA, June 2005, vol.\u00a01, pp. 886\u2013893 (2005)","key":"62_CR6","DOI":"10.1109\/CVPR.2005.177"},{"unstructured":"Everingham, M., Van Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: Proceedings of the the PASCAL Visual Object Classes Challenge 2008, VOC 2008 (2008)","key":"62_CR7"},{"unstructured":"Ji, S., Sun, L., Jin, R., Ye, J.: Multi-label multiple kernel learning. In: Advances in Neural Information Processing Systems (2009)","key":"62_CR8"},{"doi-asserted-by":"crossref","unstructured":"Jiang, Z., Luosheng, W., Yong, F., Xiao, Y.C.: Intrusion detection based on density level sets estimation. In: NAS 2008: Proceedings of the 2008 International Conference on Networking, Architecture, and Storage (2008)","key":"62_CR9","DOI":"10.1109\/NAS.2008.41"},{"key":"62_CR10","first-page":"169","volume-title":"Advances in Kernel Methods \u2014 Support Vector Learning","author":"T. Joachims","year":"1999","unstructured":"Joachims, T.: Making large\u2013scale SVM learning practical. In: Sch\u00f6lkopf, B., Burges, C.J.C., Smola, A.J. (eds.) Advances in Kernel Methods \u2014 Support Vector Learning, pp. 169\u2013184. MIT Press, Cambridge (1999)"},{"key":"62_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-69321-5_4","volume-title":"Pattern Recognition","author":"C.H. Lampert","year":"2008","unstructured":"Lampert, C.H., Blaschko, M.B.: A multiple kernel learning approach to joint multi-class object detection. In: Rigoll, G. (ed.) DAGM 2008. LNCS, vol.\u00a05096, pp. 31\u201340. Springer, Heidelberg (2008)"},{"key":"62_CR12","first-page":"27","volume":"5","author":"G. Lanckriet","year":"2004","unstructured":"Lanckriet, G., Cristianini, N., Ghaoui, L.E., Bartlett, P., Jordan, M.I.: Learning the kernel matrix with semi-definite programming. Journal of Machine Learning Research\u00a05, 27\u201372 (2004)","journal-title":"Journal of Machine Learning Research"},{"key":"62_CR13","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information Systems Security\u00a03, 227\u2013261 (2000)","journal-title":"ACM Transactions on Information Systems Security"},{"doi-asserted-by":"crossref","unstructured":"Leslie, C., Eskin, E., Noble, W.S.: The spectrum kernel: A string kernel for SVM protein classification. In: Proc. Pacific Symp. Biocomputing, pp. 564\u2013575 (2002)","key":"62_CR14","DOI":"10.1142\/9789812799623_0053"},{"doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: Learning nonstationary models of normal network traffic for detecting novel attacks. In: Proc. of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 376\u2013385 (2002)","key":"62_CR15","DOI":"10.1145\/775094.775102"},{"doi-asserted-by":"crossref","unstructured":"Mahoney, M.V., Chan, P.K.: Learning rules for anomaly detection of hostile network traffic. In: Proc. of International Conference on Data Mining (ICDM) (2003)","key":"62_CR16","DOI":"10.1109\/ICDM.2003.1250987"},{"doi-asserted-by":"crossref","unstructured":"Marszalek, M., Schmid, C.: Learning representations for visual object class recognition. In: Proceedings of the PASCAL Visual Object Classes Challenge 2007, VOC 2007 (2007)","key":"62_CR17","DOI":"10.1109\/CVPR.2007.383272"},{"unstructured":"Maynor, K., Mookhey, K., Cervini, J.F.R., Beaver, K.: Metasploit toolkit. Syngress (2007)","key":"62_CR18"},{"doi-asserted-by":"crossref","unstructured":"Rakotomamonjy, A., Bach, F., Canu, S., Grandvalet, Y.: More efficiency in multiple kernel learning. In: ICML, pp. 775\u2013782 (2007)","key":"62_CR19","DOI":"10.1145\/1273496.1273594"},{"key":"62_CR20","first-page":"2491","volume":"9","author":"A. Rakotomamonjy","year":"2008","unstructured":"Rakotomamonjy, A., Bach, F., Canu, S., Grandvalet, Y.: SimpleMKL. Journal of Machine Learning Research\u00a09, 2491\u20132521 (2008)","journal-title":"Journal of Machine Learning Research"},{"key":"62_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/11790754_5","volume-title":"Detection of Intrusions and Malware & Vulnerability Assessment","author":"K. Rieck","year":"2006","unstructured":"Rieck, K., Laskov, P.: Detecting unknown network attacks using language models. In: B\u00fcschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol.\u00a04064, pp. 74\u201390. Springer, Heidelberg (2006)"},{"issue":"4","key":"62_CR22","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11416-006-0030-0","volume":"2","author":"K. Rieck","year":"2007","unstructured":"Rieck, K., Laskov, P.: Language models for detection of unknown attacks in network traffic. Journal in Computer Virology\u00a02(4), 243\u2013256 (2007)","journal-title":"Journal in Computer Virology"},{"issue":"7","key":"62_CR23","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B. Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Computation\u00a013(7), 1443\u20131471 (2001)","journal-title":"Neural Computation"},{"key":"62_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809682","volume-title":"Kernel methods for pattern analysis","author":"J. Shawe-Taylor","year":"2004","unstructured":"Shawe-Taylor, J., Cristianini, N.: Kernel methods for pattern analysis. Cambridge University Press, Cambridge (2004)"},{"key":"62_CR25","first-page":"1531","volume":"7","author":"S. Sonnenburg","year":"2006","unstructured":"Sonnenburg, S., R\u00e4tsch, G., Sch\u00e4fer, C., Sch\u00f6lkopf, B.: Large Scale Multiple Kernel Learning. Journal of Machine Learning Research\u00a07, 1531\u20131565 (2006)","journal-title":"Journal of Machine Learning Research"},{"unstructured":"Tahir, M., van de Sande, K., Uijlings, J., Yan, F., Li, X., Mikolajczyk, K., Kittler, J., Gevers, T., Smeulders, A.: Surreyuva srkda method. In: Proceedings of the PASCAL Visual Object Classes Challenge 2008, VOC 2008 (2008)","key":"62_CR26"},{"doi-asserted-by":"crossref","unstructured":"van de Sande, K.E.A., Gevers, T., Snoek, C.G.M.: Evaluation of color descriptors for object and scene recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (2008)","key":"62_CR27","DOI":"10.1109\/CVPR.2008.4587658"},{"key":"62_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11856214_12","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2006","unstructured":"Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A content anomaly detector resistant to mimicry attack. In: Zamboni, D., Kr\u00fcgel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 226\u2013248. Springer, Heidelberg (2006)"},{"key":"62_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-30143-1_11","volume-title":"Recent Advances in Intrusion Detection","author":"K. Wang","year":"2004","unstructured":"Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 203\u2013222. Springer, Heidelberg (2004)"},{"unstructured":"Xu, Z., Jin, R., King, I., Lyu, M.R.: An extended level method for efficient multiple kernel learning. In: Advances in Neural Information Processing Systems (2009)","key":"62_CR30"},{"issue":"2","key":"62_CR31","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11263-006-9794-4","volume":"73","author":"J. Zhang","year":"2007","unstructured":"Zhang, J., Marszalek, M., Lazebnik, S., Schmid, C.: Local features and kernels for classification of texture and object categories: A comprehensive study. International Journal of Computer Vision\u00a073(2), 213\u2013238 (2007)","journal-title":"International Journal of Computer Vision"},{"key":"62_CR32","series-title":"ACM International Conference Proceeding Series","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1145\/1273496.1273646","volume-title":"ICML","author":"A. Zien","year":"2007","unstructured":"Zien, A., Ong, C.S.: Multiclass multiple kernel learning. In: Ghahramani, Z. (ed.) ICML. ACM International Conference Proceeding Series, vol.\u00a0227, pp. 1191\u20131198. ACM, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04180-8_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T21:52:50Z","timestamp":1739310770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04180-8_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642041792","9783642041808"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04180-8_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}