{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:14:40Z","timestamp":1739423680750,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642049200"},{"type":"electronic","value":"9783642049217"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04921-7_54","type":"book-chapter","created":{"date-parts":[[2009,9,22]],"date-time":"2009-09-22T11:46:25Z","timestamp":1253619985000},"page":"527-536","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Signal-Based Approach to Anomaly Detection in IDS Systems"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Saganowski","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining Techniques. ICEIS\u00a0(3), 120\u2013127 (2005)","DOI":"10.5220\/0002536601200127"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. In: PRIS 2005, pp. 144\u2013153 (2005)","DOI":"10.5220\/0002575201440153"},{"key":"54_CR3","unstructured":"FP7 INTERSECTION (INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks) Project \u2013 Description of Work"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, C.-M., Kung, H.T., Tan, K.-S.: Use of spectral analysis in defense against DoS attacks. In: IEEE GLOBECOM 2002, pp. 2143\u20132148 (2002)","DOI":"10.1109\/GLOCOM.2002.1189011"},{"key":"54_CR5","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: ACM SIGCOMM InternetMeasurement Workshop 2002 (2002)","DOI":"10.1145\/637201.637210"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Huang, P., Feldmann, A., Willinger, W.: A non-intrusive, wavelet-based approach to detecting network performance problems. In: ACM SIGCOMM Internet Measurement Workshop (November 2001)","DOI":"10.1145\/505227.505229"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Li, L., Lee, G.: DDos attack detection and wavelets. In: IEEE ICCCN 2003, October 2003, pp. 421\u2013427 (2003)","DOI":"10.1109\/ICCCN.2003.1284203"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescape, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: 2006 IEEE GLOBECOM, San Francisco, CA, USA (November 2006)","DOI":"10.1109\/GLOCOM.2006.279"},{"issue":"12","key":"54_CR9","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1109\/78.258082","volume":"41","author":"S. Mallat","year":"1993","unstructured":"Mallat, S., Zhang: Matching Pursuit with time-frequency dictionaries. IEEE Transactions on Signal Processing\u00a041(12), 3397\u20133415 (1993)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Troop, J.A.: Greed is Good: Algorithmic Results for Sparse Approximation. IEEE Transactions on Information Theory\u00a050(10) (October 2004)","DOI":"10.1109\/TIT.2004.834793"},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Gribonval, R.: Fast Matching Pursuit with a Multiscale Dictionary of Gaussian Chirps. IEEE Transactions on Signal Processing\u00a049(5) (2001)","DOI":"10.1109\/78.917803"},{"key":"54_CR12","unstructured":"Jost, P., Vandergheynst, P., Frossard, P.: Tree-Based Pursuit: Algorithm and Properties. Swiss Federal Institute of Technology Lausanne (EPFL),Signal Processing Institute Technical Report,TR-ITS-2005.013 (May 17, 2005)"},{"key":"54_CR13","first-page":"1435","volume-title":"Proceedings of ICC","author":"A. Dainotti","year":"2007","unstructured":"Dainotti, A., Pescape, A., Ventre, G.: Worm Traffic Analysis and Characterization. In: Proceedings of ICC, pp. 1435\u20131442. IEEE CS Press, Los Alamitos (2007)"},{"key":"54_CR14","first-page":"213","volume-title":"Proc. Intelligent Networks and Intelligent Systems, ICINIS 2008","author":"R. Renk","year":"2008","unstructured":"Renk, R., Saganowski, \u0141., Ho\u0142ubowicz, W., Chora\u015b, M.: Intrusion Detection System Based on Matching Pursuit. In: Proc. Intelligent Networks and Intelligent Systems, ICINIS 2008, pp. 213\u2013216. IEEE CS Press, Los Alamitos (2008)"},{"key":"54_CR15","unstructured":"WIDE Project: MAWI Working Group Traffic Archive, tracer.csl.sony.co.jp\/mawi\/"},{"key":"54_CR16","unstructured":"The CAIDA Dataset on the Witty Worm - March 19-24, Colleen Shanon and David Moore (2004), http:\/\/www.caida.org\/passive\/witty"}],"container-title":["Lecture Notes in Computer Science","Adaptive and Natural Computing Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04921-7_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T08:46:28Z","timestamp":1739349988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04921-7_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642049200","9783642049217"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04921-7_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}