{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:04:57Z","timestamp":1743739497727,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314995"},{"type":"electronic","value":"9783642315008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31500-8_67","type":"book-chapter","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T15:09:08Z","timestamp":1341328148000},"page":"648-657","source":"Crossref","is-referenced-by-count":1,"title":["Traffic Pattern Analysis for Distributed Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Grzegorz","family":"Kolaczek","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Juszczyszyn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","unstructured":"Asokan, N., Niemi, V., Nyberg, K.: Man-in-the-middle in tunnelled authentication protocols. Technical Report 2002\/163, IACR ePrint archive (2002)"},{"key":"67_CR2","unstructured":"Balasubramaniyan, J.S., Garcia-Fernandez, J.O., Isacoff, D., Spafford, E., Zamboni, D.: An Architecture for Intrusion Detection Using Autonomous Agents. In: Proceedings of the 14th Annual Computer Security Applications Conference (1998)"},{"key":"67_CR3","series-title":"LNCS","first-page":"142","volume-title":"RAID 2009","author":"P. Li","year":"2009","unstructured":"Li, P., Gao, D., Reiter, M.K.: Automatically Adapting a Trained Anomaly Detector to Software Patches. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol.\u00a05758, pp. 142\u2013160. Springer, Heidelberg (2009)"},{"key":"67_CR4","unstructured":"Denning, D.E., Edwards, D.L., Jagannathan, R., Lunt, T.F., Neumann, P.G.: A prototype IDES: A real-time intrusiondetection expert system. Technical report, Computer Science Laboratory, SRI International, Menlo Park (1987)"},{"key":"67_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/11552451_69","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"G. Kolaczek","year":"2005","unstructured":"Kolaczek, G., Pieczynska-Kuchtiak, A., Juszczyszyn, K., Grzech, A., Katarzyniak, R.P., Nguyen, N.T.: A Mobile Agent Approach to Intrusion Detection in Network Systems. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol.\u00a03682, pp. 514\u2013519. Springer, Heidelberg (2005)"},{"key":"67_CR6","doi-asserted-by":"publisher","first-page":"7332","DOI":"10.1073\/pnas.0610245104","volume":"18","author":"J.P. Onnela","year":"2007","unstructured":"Onnela, J.P., Saramaki, J., Szabo, G., Lazer, D., Kaski, K., Kertesz, J., Barabasi, Hyv\u00f6nen, A.L.: Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences\u00a018, 7332\u20137336 (2007)","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"46","key":"67_CR7","doi-asserted-by":"publisher","first-page":"17916","DOI":"10.1073\/pnas.0705081104","volume":"104","author":"J. Park","year":"2007","unstructured":"Park, J., Barab\u00e1si, A.L.: Distribution of node characteristics in complex networks. Proceedings of the National Academy of Sciences of the United States of America\u00a0104(46), 17916\u201317920 (2007)","journal-title":"Proceedings of the National Academy of Sciences of the United States of America"},{"issue":"12","key":"67_CR8","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks\u00a051(12), 3448\u20133470 (2007)","journal-title":"Computer Networks"},{"key":"67_CR9","volume-title":"Social Network Analysis: A Handbook","author":"J. Scott","year":"2000","unstructured":"Scott, J.: Social Network Analysis: A Handbook, 2nd edn. Sage, London (2000)","edition":"2"},{"key":"67_CR10","unstructured":"Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A.: Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES), Computer Science Laboratory, SRI International, Menlo Park, CA, USA SRI-CSL-95-06 (May 1995)"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Smaha, S.E.: Haystack: An intrusion detection system. In: Proceedings of the IEEE Fourth Aerospace Computer Security Applications Conference, Orlando, FL, pp. 37\u201344 (1988)","DOI":"10.1109\/ACSAC.1988.113412"},{"key":"67_CR12","unstructured":"Lunt, T.F., Tamaru, A., Gilham, F., Jagannathm, R., Jalali, C., Neumann, P.G., Javitz, H.S., Valdes, A., Garvey, T.D.: A Real-time Intrusion Detection Expert System (IDES), Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Final Technical Report (February 1992)"},{"key":"67_CR13","unstructured":"Kruegel, C., Mutz, D., Robertson, W., Valeur, F.: Bayesian event classification for intrusion detection. In: Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV (2003)"},{"key":"67_CR14","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, pp. 120\u2013128 (1996)"},{"key":"67_CR15","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-642-04595-0_4","volume-title":"Knowledge-Based and Intelligent Information and Engineering Systems","author":"G. Ko\u0142aczek","year":"2009","unstructured":"Ko\u0142aczek, G.: Multiagent Security Evaluation Framework for Service Oriented Architecture Systems. In: Vel\u00e1squez, J.D., R\u00edos, S.A., Howlett, R.J., Jain, L.C. (eds.) KES 2009. LNCS (LNAI), vol.\u00a05711, pp. 30\u201337. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Parallel Processing and Applied Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31500-8_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T04:04:12Z","timestamp":1743653052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31500-8_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314995","9783642315008"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31500-8_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}