{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:00:44Z","timestamp":1725516044307},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642344992"},{"type":"electronic","value":"9783642345005"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34500-5_48","type":"book-chapter","created":{"date-parts":[[2012,11,5]],"date-time":"2012-11-05T04:27:50Z","timestamp":1352089670000},"page":"400-409","source":"Crossref","is-referenced-by-count":8,"title":["Botnet Detection Based on Non-negative Matrix Factorization and the MDL Principle"],"prefix":"10.1007","author":[{"given":"Sayaka","family":"Yamauchi","sequence":"first","affiliation":[]},{"given":"Masanori","family":"Kawakita","sequence":"additional","affiliation":[]},{"given":"Jun\u2019ichi","family":"Takeuchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Akiyama, M., Kawamoto, T., Shimamura, M., Yokoyama, T., Kadobayashi, Y., Yamaguchi, S.: A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. In: SAINT (2007)","DOI":"10.1109\/SAINT-W.2007.14"},{"key":"48_CR2","unstructured":"Hamasaki, H., Kawakita, M., Takeuchi, J., Yoshioka, K., Inoue, D., Etoh, M., Nakao, K.: Proposal of Botnet Detection Based on Structure Learning and Its Application to Darknet Data. In: SCIS (2011)"},{"key":"48_CR3","unstructured":"Hotta, S., Miyahara, S.: An Initialization Method for Non-negative Matrix Factorization and Its Applications. Technical report, IEICE (2003)"},{"key":"48_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-642-02490-0_71","volume-title":"Advances in Neuro-Information Processing","author":"D. Inoue","year":"2009","unstructured":"Inoue, D., Yoshioka, K., Eto, M., Yamagata, M., Nishino, E., Takeuchi, J., Ohkouchi, K., Nakao, K.: An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques. In: K\u00f6ppen, M., Kasabov, N., Coghill, G. (eds.) ICONIP 2008, Part I. LNCS, vol.\u00a05506, pp. 579\u2013586. Springer, Heidelberg (2009)"},{"key":"48_CR5","unstructured":"Kitagawa, J., Kawakita, M., Takeuchi, J., Yoshioka, K., Inoue, D., Etoh, M., Nakao, K.: Extraction of Botnet Communication Based on Non-negative Matrix Factorization. In: SCIS (2010)"},{"key":"48_CR6","first-page":"556","volume":"13","author":"D.D. Lee","year":"2001","unstructured":"Lee, D.D., Seung, H.S.: Algorithms for Non-negative Matrix Factorization. Neural Inf. Process. Syst.\u00a013, 556\u2013562 (2001)","journal-title":"Neural Inf. Process. Syst."},{"key":"48_CR7","unstructured":"Nikolaus, R.: Learning the Parts of Objects Using Non-negative Matrix Factorization.Term Paper (2007)"},{"key":"48_CR8","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/0005-1098(78)90005-5","volume":"14","author":"J. Rissanen","year":"1978","unstructured":"Rissanen, J.: Modeling by Shortest Data Description. Automatica\u00a014, 465\u2013471 (1978)","journal-title":"Automatica"},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.481776","volume":"42","author":"J. Rissanen","year":"1996","unstructured":"Rissanen, J.: Fisher Information and Stochastic Complexity. IEEE Transactions on Information Theory\u00a042, 40\u201347 (1996)","journal-title":"IEEE Transactions on Information Theory"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TKDE.2006.1599387","volume":"18","author":"J. Takeuchi","year":"2006","unstructured":"Takeuchi, J., Yamanishi, K.: Unifying Framework for Detection Outliers and Change Points from Time Series. IEEE Transactions on Knowledge and Data Engineering\u00a018, 676\u2013681 (2006)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"48_CR11","unstructured":"Cyber Clean Center, \n                    \n                      https:\/\/www.ccc.go.jp"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34500-5_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:16:09Z","timestamp":1558300569000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34500-5_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642344992","9783642345005"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34500-5_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}