{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:18:23Z","timestamp":1725700703134},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642323836"},{"type":"electronic","value":"9783642323843"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-32384-3_28","type":"book-chapter","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T06:31:01Z","timestamp":1345098661000},"page":"225-232","source":"Crossref","is-referenced-by-count":5,"title":["Anomaly Detection Preprocessor for SNORT IDS System"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Saganowski","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Goncerzewicz","sequence":"additional","affiliation":[]},{"given":"Tomasz","family":"Andrysiak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"SNORT IDS, \n                    \n                      http:\/\/www.snort.org\/"},{"key":"28_CR2","unstructured":"Ye, N., Chen, Q., Emran, S.M.: Chi-squared statistical profiling for anomaly detection. In: Proc. IEEE SMC Inform. Assurance Security Workshop, West Point, pp. 182\u2013188 (2000)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Scherrer, A., Larrieu, N., Owezarski, P., Borgant, P., Abry, P.: Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies. IEEE Trans. on Dependable and Secure Computing\u00a04(1) (2007)","DOI":"10.1109\/TDSC.2007.12"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Saganowski, \u0141., Renk, R., Ho\u0142ubowicz, W.: Statistical and signal-based network traffic recognition for anomaly detection. Expert Systems: The Journal of Knowledge Engineering (2011), doi:10.1111\/j.1468-0394.2010.00576.x","DOI":"10.1111\/j.1468-0394.2010.00576.x"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Ye, N., Li, X., Chen, Q., Masum Emran, S., Xu, M.: Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. on Systems, Man and Cybernetics-Part A: Systems and Humans\u00a031(4) (2001)","DOI":"10.1109\/3468.935043"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Dainotti, A., Pescape, A., Ventre, G.: Wavelet-based Detection of DoS Attacks. In: IEEE GLOBECOM, San Francisco, CA, USA (November 2006)","DOI":"10.1109\/GLOCOM.2006.279"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Wei, L., Ghorbani, A.: Network Anomaly Detection Based on Wavelet Analysis. EURASIP Journal on Advances in Signal Processing, Article ID 837601, 16 pages (2009), doi:10.1155\/2009\/837601","DOI":"10.1155\/2009\/837601"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Grossman, A., Morlet, J.: Decompositions of Functions into Wavelets of Constant Shape, and Related Transforms. Mathematics and Physics: Lectures an Recent Results, L. Streit (1985)","DOI":"10.1142\/9789814415125_0004"},{"issue":"15","key":"28_CR9","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1006\/acha.1996.0015","volume":"3","author":"W. Sweldens","year":"1996","unstructured":"Sweldens, W.: The Lifting Scheme: A Custom-Design Construction of Biorthogonal Wavelets. Applied and Computational Harmonic Analysis\u00a03(15), 186\u2013200 (1996)","journal-title":"Applied and Computational Harmonic Analysis"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.H.: Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, pp. 201\u2013206 (2004)","DOI":"10.1145\/1028788.1028813"},{"key":"28_CR11","unstructured":"BackTrack Linux, \n                    \n                      http:\/\/www.backtrack-linux.org\/"}],"container-title":["Advances in Intelligent Systems and Computing","Image Processing and Communications Challenges 4"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32384-3_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:01:57Z","timestamp":1620129717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32384-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642323836","9783642323843"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32384-3_28","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}