{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:43Z","timestamp":1764996883983},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642143991"},{"type":"electronic","value":"9783642144004"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14400-4_46","type":"book-chapter","created":{"date-parts":[[2010,6,26]],"date-time":"2010-06-26T01:18:09Z","timestamp":1277515089000},"page":"595-605","source":"Crossref","is-referenced-by-count":19,"title":["Semi-supervised Learning for False Alarm Reduction"],"prefix":"10.1007","author":[{"given":"Chien-Yi","family":"Chiu","sequence":"first","affiliation":[]},{"given":"Yuh-Jye","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chien-Chung","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Wen-Yang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hsiu-Chuan","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","unstructured":"Bro reference manual: Analyzers and events (April 2007), \n                    \n                      http:\/\/www.bro-ids.org\/wiki\/index.php\/Reference_Manual:_Analyzers_and_Events"},{"key":"46_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/11496137_14","volume-title":"Applied Cryptography and Network Security","author":"A. Alharby","year":"2005","unstructured":"Alharby, A., Imai, H.: IDS false alarm reduction using continuous and discontinuous patterns. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 192\u2013205. Springer, Heidelberg (2005)"},{"key":"46_CR3","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, Computer Security Division of the Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD (1980)"},{"key":"46_CR4","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/279943.279962","volume-title":"COLT: Proceedings of the Workshop on Computational Learning Theory","author":"A. Blum","year":"1998","unstructured":"Blum, A., Mitchell, T.: Combining labeled and unlabeled data with co-training. In: COLT: Proceedings of the Workshop on Computational Learning Theory, pp. 92\u2013100. Morgan Kaufmann Publishers, San Francisco (1998)"},{"key":"46_CR5","unstructured":"Chang, C.-C., Pao, H.-K., Lee, Y.-J.: An RSVM based two-teachers-one-student semi-supervised learning algorithm. Pattern Recognition (under submission)"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Chen, C., Gong, Y., Tian, Y.: Semi-supervised learning methods for network intrusion detection. In: Proceeding of IEEE International Conference on Systems, Man and Cybernetics, October 2008, pp. 2603\u20132608 (2008)","DOI":"10.1109\/ICSMC.2008.4811688"},{"key":"46_CR7","unstructured":"Hettich, S., Bay, S.D.: The uci kdd archive (1999), \n                    \n                      http:\/\/kdd.ics.uci.edu\/"},{"key":"46_CR8","unstructured":"Lane, T.: A decision-theoretic, semi-supervised model for intrusion detection. In: Machine learning and data mining for computer security: Methods and applications, number 978-1-84628-029-0 (Print) 978-1-84628-253-9 (Online). Advanced Information and Knowledge Processing, pp. 157\u2013177. Springer, Heidelberg (2006)"},{"issue":"4","key":"46_CR9","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC)\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Lee, Y.-J., Mangasarian, O.L.: RSVM: Reduced support vector machines. In: Proceedings of the First SIAM International Conference on Data Mining (2001)","DOI":"10.1137\/1.9781611972719.13"},{"key":"46_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/978-3-540-45248-5_13","volume-title":"An analysis of the 1999 DARPA\/Lincoln Laboratory evaluation data for network anomaly detection","author":"M.V. Mahoney","year":"2003","unstructured":"Mahoney, M.V., Chan, P.K.: An analysis of the 1999 DARPA\/Lincoln Laboratory evaluation data for network anomaly detection. LNCS, pp. 220\u2013238. Springer, Heidelberg (2003)"},{"key":"46_CR12","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1145\/1529282.1529735","volume-title":"Proceedings of the 2009 ACM symposium on Applied Computing","author":"C.H. Mao","year":"2009","unstructured":"Mao, C.H., Lee, H.M., Parikh, D., Chen, T., Huang, S.Y.: Semi-supervised co-training and active learning based approach for multi-view intrusion detection. In: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 2042\u20132048. ACM, New York (2009)"},{"issue":"4","key":"46_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"key":"46_CR14","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. In: USENIX (ed.) Seventh USENIX Security Symposium proceedings: conference proceedings, San Antonio, Texas, January 26-29. USENIX (1998)"},{"key":"46_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-30143-1_6","volume-title":"Recent Advances in Intrusion Detection","author":"T. Pietraszek","year":"2004","unstructured":"Pietraszek, T.: Using adaptive alert classification to reduce false positives in intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 102\u2013124. Springer, Heidelberg (2004)"},{"key":"46_CR16","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Large Installation System Administration Conference (LISA Conference), pp. 229\u2013238 (1999)"},{"issue":"11","key":"46_CR17","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1109\/TKDE.2005.186","volume":"17","author":"Z.-H. Zhou","year":"2005","unstructured":"Zhou, Z.-H., Li, M.: Tri-training: Exploiting unlabeled data using three classifiers. IEEE Transactions on Knowledge and Data Engineering\u00a017(11), 1529\u20131541 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14400-4_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:26:24Z","timestamp":1619771184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14400-4_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143991","9783642144004"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14400-4_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}