{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:40:55Z","timestamp":1742920855247,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210426"},{"type":"electronic","value":"9783642210433"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21043-3_28","type":"book-chapter","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T16:36:15Z","timestamp":1306254975000},"page":"234-239","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly-Based Network Intrusion Detection Using Outlier Subspace Analysis: A Case Study"],"prefix":"10.1007","author":[{"given":"David","family":"Kershaw","sequence":"first","affiliation":[]},{"given":"Qigang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Yu, P.S.: Outlier Detection for High Dimensional Data. In: SIGMOD 2001 (2001)","DOI":"10.1145\/375663.375668"},{"key":"28_CR2","unstructured":"Forrest, S.A., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for UNIX Processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120\u2013128 (2001)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Forrest, S.A., Warrender, C., Perlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: Proceedings of the 1999 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P. Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Macia-Fernandez, G., Vazquez, E.: Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges. Computers and Security\u00a028, 18\u201328 (2009)","journal-title":"Computers and Security"},{"key":"28_CR5","unstructured":"Symantec Global Internet Security Threat Report: Trends for 2008, Vol. XIV (2008) (published April 2009)"},{"key":"28_CR6","unstructured":"Tan, K., Maxion, R.: Why 6? Defining the Operational Limits of Stide,and Anomaly-Based Intrusion Detectors. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 133\u2013145 (2002)"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Wenke, J., Salvatore, J.: Framework for Construction Features and Models for Intrusion Detection Systems. In: TISSEC, pp. 227\u2013261 (2000)","DOI":"10.1145\/382912.382914"},{"key":"28_CR8","unstructured":"Zhang, J.: Towards Outlier Detection for High-Dimensional Data Streams Using Projected Outlier Analysis Strategy. PHD Thesis. Dalhousie University (2008)"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21043-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T19:48:52Z","timestamp":1741204132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21043-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210426","9783642210433"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21043-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}