{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T05:10:57Z","timestamp":1741237857616,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207563"},{"type":"electronic","value":"9783642207570"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20757-0_2","type":"book-chapter","created":{"date-parts":[[2011,4,28]],"date-time":"2011-04-28T01:49:00Z","timestamp":1303955340000},"page":"15-27","source":"Crossref","is-referenced-by-count":5,"title":["Learning Entropy"],"prefix":"10.1007","author":[{"given":"Lele","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Darryl","family":"Veitch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Celenk, M., Conley, T., Willis, J., Graham, J.: Anomaly Detection and Visualization using Fisher Discriminant Clustering of Network Entropy. In: Pichappan, P., Abraham, A. (eds.) Third IEEE ICDIM, pp. 216\u2013220 (2008)","DOI":"10.1109\/ICDIM.2008.4746810"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Mausam, Sanghai, S., Verma, D.: Adversarial Classification. In: KDD 2004: Proceedings of the 10th ACM SIGKDD, pp. 99\u2013108 (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical Approaches to DDoS Attack Detection and Response. In: DARPA Information Survivability Conference and Exposition, vol.\u00a01, pp. 303\u2013314 (2003)","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"2_CR4","unstructured":"Lee, W., Xiang, D.: Information-Theoretic Measures for Anomaly Detection. In: Proc. of IEEE Symposium on Security and Privacy, pp. 130\u2013143 (2001)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-77048-0_35","volume-title":"Information and Communications Security","author":"L. Li","year":"2007","unstructured":"Li, L., Zhou, J., Xiao, N.: DDos Attack Detection Algorithms based on Entropy Computing. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol.\u00a04861, pp. 452\u2013466. Springer, Heidelberg (2007)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Lowd, D., Meek, C.: Adversarial learning. In: KDD 2005: Proceedings of the 11th ACM SIGKDD, pp. 641\u2013647 (2005)","DOI":"10.1145\/1081870.1081950"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Nychis, G., Sekar, V., Andersen, D.G., Kim, H., Zhang, H.: An Empirical Evaluation of Entropy-Based Traffic Anomaly Detection. In: IMC 2008: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, pp. 151\u2013156 (2008)","DOI":"10.1145\/1452520.1452539"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D., Lau, S.h., Rao, S., Taft, N., Tygar, J.D.: ANTIDOTE: Understanding and Defending Against Poisoning of Anomaly Detectors. In: IMC 2009: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, pp. 1\u201314 (2009)","DOI":"10.1145\/1644893.1644895"},{"key":"2_CR9","first-page":"239","volume-title":"Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics","author":"B. Tellenbach","year":"2009","unstructured":"Tellenbach, B., Burkhart, M., Sornette, D., Maillart, T.: Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics, pp. 239\u2013248. Springer, Berlin (2009)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Wagner, A., Plattner, B.: Entropy based Worm and Anomaly Detection in Fast IP Networks. In: WETICE 2005: Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, pp. 172\u2013177 (2005)","DOI":"10.1109\/WETICE.2005.35"},{"issue":"12","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/LCOMM.2007.070761","volume":"11","author":"A. Ziviani","year":"2007","unstructured":"Ziviani, A., Gomes, A.T.A., Monsores, M.L., Rodrigues, P.S.S.: Network Anomaly Detection using Nonextensive Entropy. IEEE Communications Letters\u00a011(12), 1034\u20131036 (2007)","journal-title":"IEEE Communications Letters"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20757-0_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T08:41:55Z","timestamp":1741164115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20757-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207563","9783642207570"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20757-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}