{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:54:42Z","timestamp":1725627282447},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642245794"},{"type":"electronic","value":"9783642245800"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24580-0_14","type":"book-chapter","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T06:21:42Z","timestamp":1320214902000},"page":"195-208","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services"],"prefix":"10.1007","author":[{"given":"Hiroyuki","family":"Shinbo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Toru","family":"Hasegawa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"8","key":"14_CR1","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"T. Marina","year":"2003","unstructured":"Marina, T., Chuanyi, J.: Anomaly Detection in IP Networks. IEEE Transactions on Signal Processing\u00a051(8), 2191\u20132204 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"14_CR2","unstructured":"Hiroyuki, S., Satoshi, K., Hideyuki, K., Teruyuki, H., Hidetoshi, Y.: A scheme for detecting communication abnormality in mobile core networks based on user behavior. In: The 12th International Symposium on Wireless Personal Multimedia Communications, WPMC 2009 (2009)"},{"key":"14_CR3","unstructured":"Sumaru, N.: Experimental Study on User Behavior Analysis by Keylogs of Cellular Phone. In: IEICE 5th Workshop on Brain Communication (2008) (in Japanese)"},{"key":"14_CR4","unstructured":"NIST\/SEMATECH: e-Handbook of Statistical Methods, Sect.6.4.3.1 (2006), \n                  \n                    http:\/\/www.itl.nist.gov\/div898\/handbook\/"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Case, J., Fedor, M., Schoffstall, M., Davin, J.: Simple Network Management Protocol (SNMP). RFC1157 (1990)","DOI":"10.17487\/rfc1157"},{"key":"14_CR6","unstructured":"Duffield, N.G., Gerber, A., Grossglauser, M.: Trajectory Engine: A Backend for Trajectory Sampling. In: IEEE Network Operations and Management Symposium 2002 (2002)"},{"key":"14_CR7","unstructured":"Matthias, W., Peter, U., Xavier, D.: An SNMP based failure detection service. In: The Proceedings of 25th IEEE Symposium on Reliable Distributed Systems, SRDS 2006 (2006)"},{"key":"14_CR8","unstructured":"Irina, R., Mark, B., Natalia, O., Sheng, M., Genadv, G.: Real-time Problem Determination in Distributed Systems using Active Probing. In: IEEE\/IFIP Network Operations and Management Symposium (NOMS 2004), vol.\u00a01, pp. 133\u2013146 (2004)"},{"key":"14_CR9","unstructured":"Wolfgang, B.: Nagios, Second Edition, System and Network Monitoring. No Starch Press (2008)"},{"key":"14_CR10","volume-title":"The 3G IP Multimedia Subsystem: Merging the Internet and the Cellular Worlds","author":"C. Gonzalo","year":"2004","unstructured":"Gonzalo, C., Miguel-Angel, G.: The 3G IP Multimedia Subsystem: Merging the Internet and the Cellular Worlds. Wiley, Chichester (2004)"}],"container-title":["Lecture Notes in Computer Science","Testing Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24580-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:23:42Z","timestamp":1558297422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24580-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642245794","9783642245800"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24580-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}