{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:53:13Z","timestamp":1725569593222},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173127"},{"type":"electronic","value":"9783642173134"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17313-4_29","type":"book-chapter","created":{"date-parts":[[2010,11,11]],"date-time":"2010-11-11T17:09:54Z","timestamp":1289495394000},"page":"290-301","source":"Crossref","is-referenced-by-count":1,"title":["Modeling DNS Activities Based on Probabilistic Latent Semantic Analysis"],"prefix":"10.1007","author":[{"given":"Xuebiao","family":"Yuchi","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Baoping","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/846183.846188","volume":"1","author":"J. Srivastava","year":"2000","unstructured":"Srivastava, J., Cooley, R., Deshpande, M.: Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data. SIGKDD Explorations Newsletter\u00a01, 12\u201323 (2000)","journal-title":"SIGKDD Explorations Newsletter"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/643477.643478","volume":"3","author":"M. Eirinaki","year":"2003","unstructured":"Eirinaki, M., Vazirgiannis, M.: Web Mining for Web Personalization. ACM Transactions on Internet Technology\u00a03, 1\u201327 (2003)","journal-title":"ACM Transactions on Internet Technology"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1117454.1117456","volume":"7","author":"L. Getoor","year":"2005","unstructured":"Getoor, L., Diehl, C.P.: Link Mining: a Survey. ACM SIGKDD Explorations Newsletter\u00a07, 3\u201312 (2005)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1023\/B:MACH.0000035473.11134.83","volume":"57","author":"R. Kohavi","year":"2004","unstructured":"Kohavi, R., Mason, L., Parekh, R., Zheng, Z.: Lessons and Challenges from Mining Retail E-Commerce Data. Machine Learning\u00a057, 83\u2013113 (2004)","journal-title":"Machine Learning"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Mockapetris, P.: Domain Names: Concepts and Facilities. Internet Request for Comments\u00a01034 (1987)","DOI":"10.17487\/rfc1034"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Hofmann, T.: Probabilistic Latent Semantic Analysis. In: 15th Conference on Uncertainty in Artificial Intelligence, Stockholm (1999)","DOI":"10.1145\/312624.312649"},{"key":"29_CR7","volume-title":"22nd Annual ACM Conference on Research and Development in Information Retrieval","author":"T. Hofmann","year":"1999","unstructured":"Hofmann, T.: Probabilistic Latent Semantic Analysis. In: 22nd Annual ACM Conference on Research and Development in Information Retrieval. ACM Press, Berkeley (1999)"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/963770.963774","volume":"22","author":"T. Hofmann","year":"2004","unstructured":"Hofmann, T.: Latent Semantic Models for Collaborative Filtering. ACM Transactions on Information Systems\u00a022, 89\u2013115 (2004)","journal-title":"ACM Transactions on Information Systems"},{"issue":"39","key":"29_CR9","first-page":"1","volume":"B","author":"A. Dempster","year":"1977","unstructured":"Dempster, A., Laird, N., Rubin, D.: Maximum Likelihood from Incomplete Data via the EM Algorithm. Journal of Royal Statistical Society\u00a0B(39), 1\u201338 (1977)","journal-title":"Journal of Royal Statistical Society"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1140\/epjb\/e2004-00124-y","volume":"38","author":"M.E.J. Newman","year":"2004","unstructured":"Newman, M.E.J.: Detecting Community Structure in Networks. Eur. Phys. J. B.\u00a038, 321\u2013330 (2004)","journal-title":"Eur. Phys. J. B."},{"key":"29_CR11","unstructured":"MaxMind, http:\/\/www.maxmind.com"},{"key":"29_CR12","unstructured":"CNNIC, http:\/\/www.cnnic.cn"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J. Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Attacks and Defense Mechanisms. ACM SIGCOMM Computer Communication Review\u00a034, 39\u201353 (2004)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"29_CR14","unstructured":"OpenDNS, http:\/\/www.opendns.com"},{"key":"29_CR15","unstructured":"CSTNET, http:\/\/www.cstnet.cn"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17313-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T02:53:14Z","timestamp":1559789594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17313-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642173127","9783642173134"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17313-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}