{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:44:10Z","timestamp":1725896650796},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642317149"},{"type":"electronic","value":"9783642317156"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31715-6_59","type":"book-chapter","created":{"date-parts":[[2012,7,20]],"date-time":"2012-07-20T20:42:14Z","timestamp":1342816934000},"page":"560-569","source":"Crossref","is-referenced-by-count":0,"title":["Framework for the Establishment of Resource-Aware Data Mining Techniques on Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Miguel \u00c1ngel","family":"Abad","sequence":"first","affiliation":[]},{"given":"Ernestina","family":"Menasalvas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"14","key":"59_CR1","doi-asserted-by":"publisher","first-page":"1952","DOI":"10.1016\/j.ins.2005.11.007","volume":"176","author":"S. Bandyopadhyay","year":"2006","unstructured":"Bandyopadhyay, S., Giannella, C., Maulik, U., Kargupta, H., Liu, K., Datta, S.: Clustering distributed data streams in peer-to-peer environments. Inf. Sci.\u00a0176(14), 1952\u20131985 (2006)","journal-title":"Inf. Sci."},{"key":"59_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-39653-6_12","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"L. Barkhuus","year":"2003","unstructured":"Barkhuus, L., Dey, A.K.: Is context-aware computing taking control away from the user? Three levels of interactivity examined. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 149\u2013156. Springer, Heidelberg (2003)"},{"key":"59_CR3","unstructured":"Bernstein, A., Provost, F.: An intelligent assistant for the knowledge discovery process. Information Systems Working Papers Series (2001)"},{"key":"59_CR4","unstructured":"Krutz, R.L.: Securing SCADA systems, pp. 4\u201316. Wiley Publishing, Inc. (2006)"},{"key":"59_CR5","first-page":"102","volume-title":"Proceedings of the 2009 International Joint Conference on Neural Networks, IJCNN 2009","author":"O. Linda","year":"2009","unstructured":"Linda, O., Vollmer, T., Manic, M.: Neural network based intrusion detection system for critical infrastructures. In: Proceedings of the 2009 International Joint Conference on Neural Networks, IJCNN 2009, pp. 102\u2013109. IEEE Press, Piscataway (2009)"},{"key":"59_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-540-74810-6_6","volume-title":"Foundations of Security Analysis and Design IV","author":"J. Lopez","year":"2007","unstructured":"Lopez, J., Alcaraz, C., Roman, R.: On the Protection and Technologies of Critical Information Infrastructures. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol.\u00a04677, pp. 160\u2013182. Springer, Heidelberg (2007)"},{"key":"59_CR7","unstructured":"Saitta, L., May, M.: Blueprint in Ubiquitous Knowledge Discovery (2007)"},{"issue":"4","key":"59_CR8","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.jnca.2010.01.003","volume":"33","author":"A.N. Mahmood","year":"2010","unstructured":"Mahmood, A.N., Hu, J., Tari, Z., Leckie, C.: Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. J. Network and Computer Applications\u00a033(4), 491\u2013502 (2010)","journal-title":"J. Network and Computer Applications"},{"key":"59_CR9","unstructured":"Menasalvas, E., Eibe, S., Gomes, J., Zanda, A.: Context-aware recommendations in ubiquitous devices (2008)"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Ning, P., Jajodia, S.: Intrusion Detection Basics. In: Bidgoli, H, ed. (2006)","DOI":"10.1002\/9781118256107.ch26"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Mell, P.: Intrusion detection and prevention systems. In: Handbook of Information and Communication Security, pp. 177\u2013192 (2010)","DOI":"10.1007\/978-3-642-04117-4_9"},{"key":"59_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1007608224229","volume":"40","author":"Y.S. Shih","year":"2000","unstructured":"Shih, Y.S., Lim, T.S., Loh, W.Y.: A comparison of prediction accuracy, complexity, and training time of thirty-three old and new classification algorithms. Machine Learning\u00a040, 203\u2013228 (2000)","journal-title":"Machine Learning"},{"key":"59_CR13","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann (2005)"},{"key":"59_CR14","doi-asserted-by":"crossref","unstructured":"Wu, C.H., Yang, C.H., Lo, S.C., Vichare, N., Rhem, E., Pecht, M.: Automatic data mining for telemetry database of computer systems. Microelectronics Reliability (October 2010)","DOI":"10.1016\/j.microrel.2010.09.008"},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Yu, Z., Tsai, J.J.P., Weigert, T.: An adaptive automatically tuning intrusion detection system. ACM Transactions on Autonomous and Adaptive Systems\u00a03 (August 2008)","DOI":"10.1145\/1380422.1380425"},{"key":"59_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1380422.1380425","volume":"3","author":"Z. Yu","year":"2008","unstructured":"Yu, Z., Tsai, J.J.P., Weigert, T.: An adaptive automatically tuning intrusion detection system. ACM Trans. Auton. Adapt. Syst.\u00a03, 10:1\u201310:25 (2008)","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"key":"59_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: 2006 IEEE International Conference on Communications, pp. 2388\u20132393 (2006)","DOI":"10.1109\/ICC.2006.255127"}],"container-title":["Communications in Computer and Information Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31715-6_59.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T11:17:47Z","timestamp":1687605467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31715-6_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642317149","9783642317156"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31715-6_59","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}