{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:14:22Z","timestamp":1771373662192,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642239564","type":"print"},{"value":"9783642239571","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23957-1_20","type":"book-chapter","created":{"date-parts":[[2011,9,10]],"date-time":"2011-09-10T12:43:04Z","timestamp":1315658584000},"page":"172-181","source":"Crossref","is-referenced-by-count":20,"title":["Anomaly Detection from Network Logs Using Diffusion Maps"],"prefix":"10.1007","author":[{"given":"Tuomo","family":"Sipola","sequence":"first","affiliation":[]},{"given":"Antti","family":"Juvonen","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Lehtonen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/978-3-540-35488-8_28","volume-title":"Feature Extraction","author":"Y. Bengio","year":"2006","unstructured":"Bengio, Y., Delalleau, O., Roux, N.L., Paiement, J.F., Vincent, P., Ouimet, M.: Spectral Dimensionality Reduction. In: Feature Extraction. Studies in Fuzziness and Soft Computing, pp. 519\u2013550. Springer, Heidelberg (2006)"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V. Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv.\u00a041(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"key":"20_CR3","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"20_CR4","first-page":"2","volume-title":"Spectral Graph Theory","author":"F.R.K. Chung","year":"1997","unstructured":"Chung, F.R.K.: Spectral Graph Theory, p. 2. AMS Press, Providence (1997)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"7426","DOI":"10.1073\/pnas.0500334102","volume":"102","author":"R.R. Coifman","year":"2005","unstructured":"Coifman, R.R., Lafon, S., Lee, A.B., Maggioni, M., Nadler, B., Warner, F., Zucker, S.W.: Geometric diffusions as a tool for harmonic analysis and structure definition of data: Diffusion maps. Proceedings of the National Academy of Sciences of the United States of America\u00a0102, 7426 (2005)","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"issue":"1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.acha.2006.04.006","volume":"21","author":"R.R. Coifman","year":"2006","unstructured":"Coifman, R.R., Lafon, S.: Diffusion maps. Applied and Computational Harmonic Analysis\u00a021(1), 5\u201330 (2006)","journal-title":"Applied and Computational Harmonic Analysis"},{"issue":"5199","key":"20_CR7","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1126\/science.267.5199.843","volume":"267","author":"M. Damashek","year":"1995","unstructured":"Damashek, M.: Gauging similarity with n-grams: Language-independent categorization of text. Science\u00a0267(5199), 843 (1995)","journal-title":"Science"},{"key":"20_CR8","unstructured":"David, G.: Anomaly Detection and Classification via Diffusion Processes in Hyper-Networks. Ph.D. thesis, Tel-Aviv University (2009)"},{"key":"20_CR9","volume-title":"Data mining: concepts and techniques","author":"J. Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data mining: concepts and techniques. Morgan Kaufmann, San Francisco (2006)"},{"key":"20_CR10","unstructured":"\u0130zmirli, \u00d6.: Tonal-atonal classification of music audio using diffusion maps. In: 10th International Society for Music Information Retrieval Conference (ISMIR 2009) (2009)"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1145\/990308.990313","volume":"51","author":"R. Kannan","year":"2004","unstructured":"Kannan, R., Vempala, S., Vetta, A.: On clusterings: Good, bad and spectral. J. ACM\u00a051, 497\u2013515 (2004)","journal-title":"J. ACM"},{"issue":"1","key":"20_CR12","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/TSP.2009.2030861","volume":"58","author":"Y. Keller","year":"2010","unstructured":"Keller, Y., Coifman, R., Lafon, S., Zucker, S.: Audio-visual group recognition using diffusion maps. IEEE Transactions on Signal Processing\u00a058(1), 403\u2013413 (2010)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11222-007-9033-z","volume":"17","author":"U. Luxburg von","year":"2007","unstructured":"von Luxburg, U.: A tutorial on spectral clustering. Statistics and Computing\u00a017, 395\u2013416 (2007)","journal-title":"Statistics and Computing"},{"key":"20_CR14","unstructured":"Meila, M., Shi, J.: Learning segmentation by random walks. In: NIPS, pp. 873\u2013879 (2000)"},{"key":"20_CR15","unstructured":"Mukkamala, S., Sung, A.: A comparative study of techniques for intrusion detection (2003)"},{"key":"20_CR16","series-title":"Lecture Notes in Computational Science and Engineering","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-73750-6_10","volume-title":"Principal Manifolds for Data Visualization and Dimension Reduction","author":"B. Nadler","year":"2008","unstructured":"Nadler, B., Lafon, S., Coifman, R., Kevrekidis, I.G.: Diffusion maps \u2013 a probabilistic interpretation for spectral embedding and clustering algorithms. In: Barth, T.J., Griebel, M., Keyes, D.E., Nieminen, R.M., Roose, D., Schlick, T., Gorban, A.N., K\u00e9gl, B., Wunsch, D.C., Zinovyev, A.Y. (eds.) Principal Manifolds for Data Visualization and Dimension Reduction. Lecture Notes in Computational Science and Engineering, vol.\u00a058, pp. 238\u2013260. Springer, Heidelberg (2008)"},{"key":"20_CR17","first-page":"849","volume-title":"Advances in Neural Information Processing Systems","author":"A.Y. Ng","year":"2001","unstructured":"Ng, A.Y., Jordan, M.I., Weiss, Y.: On spectral clustering: Analysis and an algorithm. In: Advances in Neural Information Processing Systems, vol.\u00a014, pp. 849\u2013856. MIT Press, Cambridge (2001)"},{"key":"20_CR18","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/0-387-25660-1_20","volume-title":"Security and Privacy in the Age of Ubiquitous Computing","author":"A. Nguyen-Tuong","year":"2005","unstructured":"Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.: Automatically hardening web applications using precise tainting. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) Security and Privacy in the Age of Ubiquitous Computing. IFIP AICT, vol.\u00a0181, pp. 295\u2013307. Springer, Boston (2005)"},{"issue":"12","key":"20_CR19","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"Patcha, A., Park, J.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks\u00a051(12), 3448\u20133470 (2007)","journal-title":"Computer Networks"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-45248-5_3","volume-title":"Recent Advances in Intrusion Detection","author":"M. Ramadas","year":"2003","unstructured":"Ramadas, M., Ostermann, S., Tjaden, B.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 36\u201354. Springer, Heidelberg (2003)"},{"issue":"1","key":"20_CR21","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.dsp.2009.02.002","volume":"20","author":"A. Schclar","year":"2010","unstructured":"Schclar, A., Averbuch, A., Rabin, N., Zheludev, V., Hochman, K.: A diffusion framework for detection of moving vehicles. Digital Signal Processing\u00a020(1), 111\u2013122 (2010)","journal-title":"Digital Signal Processing"},{"issue":"8","key":"20_CR22","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/34.868688","volume":"22","author":"J. Shi","year":"2000","unstructured":"Shi, J., Malik, J.: Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a022(8), 888\u2013905 (2000)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"20_CR23","unstructured":"Tran, Q., Duan, H., Li, X.: One-class support vector machine for anomaly network traffic detection. China Education and Research Network (CERNET) (2004)"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Tran, Q.A., Zhang, Q., Li, X.: Evolving training model method for one-class svm. In: IEEE International Conference on Systems, Man and Cybernetics, vol.\u00a03, pp. 2388\u20132393 (2003)","DOI":"10.1109\/ICSMC.2003.1244241"},{"key":"20_CR25","unstructured":"Turkka, J., Ristaniemi, T., David, G., Averbuch, A.: Anomaly detection framework for tracing problems in radio networks. In: Proc. to ICN 2011 (2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23957-1_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T12:04:11Z","timestamp":1741608251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23957-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642239564","9783642239571"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23957-1_20","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1861-2288","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}