{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:52:27Z","timestamp":1725749547086},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642409240"},{"type":"electronic","value":"9783642409257"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40925-7_36","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"389-400","source":"Crossref","is-referenced-by-count":1,"title":["Learning Algorithms in the Detection of Unused Functionalities in SOA Systems"],"prefix":"10.1007","author":[{"given":"Ilona","family":"Bluemke","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Tarka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"BPEL Standard, \n                    \n                      http:\/\/docs.oasis-open.org\/wsbpel\/2.0\/wsbpel-v2.0.html\n                    \n                    \n                   (access July 2011)"},{"key":"36_CR2","unstructured":"SOA manifesto, \n                    \n                      http:\/\/www.soa-manifesto.org\n                    \n                    \n                   (access July 2011)"},{"key":"36_CR3","unstructured":"Lim, S.Y., Jones, A.: Network Anomaly Detection System: The State of Art of Network Behavior Analysis. In: Proc. of the Int. Conf. on Convergence and Hybrid Information Technology 2008, pp. 459\u2013465 (2008), doi:10.1109\/ICHIT2008.249"},{"key":"36_CR4","unstructured":"Ko, C., Ruschitzka, M., Levitt, K.: Execution monitoring of security-critical programs in distributed systems: a specification-based approach. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, CA, USA (1997)"},{"key":"36_CR5","unstructured":"Lemonnier, E.: Protocol Anomaly Detection in Network-based IDSs. Defcom white paper (2001)"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Sekar, R., Gupta, A., Frullo, J., Shanbag, T., Tiwari, A., Yang, H., Zhou, S.: Specification-based anomaly detection: A New Approach for Detecting Network Intrusions. In: ACM Computer and Communication Security Conference, Washington, DC, USA (2002)","DOI":"10.1145\/586110.586146"},{"key":"36_CR7","unstructured":"Shan, Z., Chen, P., Xu, Y., Xu, K.: A Network State Based Intrusion Detection Model. In: Proc. of the 2001 Int. Conf. on Computer Networks and Mobile Computing, ICCNMC 2001 (2001)"},{"key":"36_CR8","unstructured":"Buschkes, R., Borning, M., Kesdogan, D.: Transaction-based Anomaly Detection. In: Proc. of the Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, USA (1999)"},{"key":"36_CR9","unstructured":"Anderson, D., Frivold, T.: Valdes: A Next-generation Intrusion Detection Expert System (NIDES) Summary. Computer Science Laboratory, SRI-CSL-95-07 (May 1995)"},{"key":"36_CR10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1504\/IJSN.2006.011780","volume":"1","author":"S. Owens","year":"2006","unstructured":"Owens, S., Levary, R.: An adaptive expert system approach for intrusion detection. International Journal of Security and Networks\u00a01, 3\u20134 (2006)","journal-title":"International Journal of Security and Networks"},{"key":"36_CR11","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proc. of the 7th USENIX Security Symposium (1998)"},{"key":"36_CR12","first-page":"579","volume-title":"Proc. Intelligent Eng. Systems through Neural Networks, ANNIE 2002","author":"A. Bivens","year":"2002","unstructured":"Bivens, A., Palagrini, C., Smith, R., Szyma\u0144ski, B., Embrechts, M.: Network-based intrusion detection using neural networks. In: Proc. Intelligent Eng. Systems through Neural Networks, ANNIE 2002, St. Louis, MO, vol.\u00a012, pp. 579\u2013584. ASME Press, NY (2002)"},{"key":"36_CR13","unstructured":"C Neural network library, \n                    \n                      http:\/\/franck.fleurey.free.fr\/NeuralNetwork\/"},{"key":"36_CR14","unstructured":"NeuroBox, \n                    \n                      http:\/\/www.cdrnet.net\/projects\/neuro\/"},{"key":"36_CR15","unstructured":"Fast Artificial Neural Network Library, \n                    \n                      http:\/\/sourceforge.net\/projects\/fann\/"},{"key":"36_CR16","unstructured":"Ryan, J., Lin, M., Miikkulainen, M.: Intrusion Detection with Neural Networks. In: Advances in Neural Information Processing Systems, vol.\u00a010 (1998)"},{"key":"36_CR17","unstructured":"Ghosh, A.K., Schwartzbard, A.: A Study in Using Neural Networks for Anomaly and Misuse Detection. In: Proc. of the 8th USENIX Security Symposium, Washington D.C., USA (1999)"},{"key":"36_CR18","unstructured":"Han, S.-J., Cho, S.-B.: Evolutionary Neural Networks for Anomaly Detection Based on the Behaviour of a Program. IEEE Transactions on Systems, Man and Cybernetics (2006)"},{"key":"36_CR19","first-page":"579","volume-title":"Proc. of Intelligent Engineering Systems through Artificial Neural Networks, ANNIE 2002","author":"A. Bivens","year":"2002","unstructured":"Bivens, A., et al.: Network-based intrusion detection using neural networks. In: Proc. of Intelligent Engineering Systems through Artificial Neural Networks, ANNIE 2002, St.Luis, MO, vol.\u00a012, pp. 579\u2013584. ASME press, New York (2002)"},{"key":"36_CR20","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-540-68123-6_20","volume-title":"Foundations of Intelligent Systems","author":"M. Ceci","year":"2008","unstructured":"Ceci, M., Appice, A., Caruso, C., Malerba, D.: Discovering Emerging Patterns for Anomaly Detection in Network Connection Data. In: An, A., Matwin, S., Ra\u015b, Z.W., \u015al\u0119zak, D. (eds.) ISMIS 2008. LNCS (LNAI), vol.\u00a04994, pp. 179\u2013188. Springer, Heidelberg (2008)"},{"key":"36_CR21","unstructured":"Denning, D., Neumann, P.: Requirements and Model for IDES-A Real-Time Intrusion-Detection Expert System. SRI Project 6169, SRI International, Menlo Park, CA (1985)"},{"key":"36_CR22","unstructured":"Masum, S., Ye, E.M., Chen, Q., Noh, K.: Chi-square statistical profiling for anomaly detection. In: Proceedings of the 2000 IEEE Workshop on Information Assurance and Security (2000)"},{"key":"36_CR23","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1002\/qre.392","volume":"17","author":"N. Ye","year":"2001","unstructured":"Ye, N., Chen, Q.: An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Qual. Reliab. Eng. Int.\u00a017, 105\u2013112 (2001)","journal-title":"Qual. Reliab. Eng. Int."},{"key":"36_CR24","unstructured":"Tarka, M.: Anomaly detection in SOA systems. Msc Thesis, Institute of Computer Science, Warsaw University of Technology (2011) (in polish)"},{"key":"36_CR25","unstructured":"The R Project for Statistical Computing, \n                    \n                      http:\/\/gcc.gnu.org\/\n                    \n                    \n                   (access September 2011)"},{"key":"36_CR26","unstructured":"Munz, G., Li, S., Carle, G.: Traffic Anomaly Detection Using K-Means Clustering. Wilhelm Schickard Institute for Computer Science, University of Tuebingen (2007)"},{"key":"36_CR27","unstructured":"Guozhu, D., Jinyan, L.: Efficient Mining of Emerging Patterns: Discovering Trends and Differences. Wright State University, The University of Melbourne (2007)"},{"key":"36_CR28","unstructured":"Hanley, J.A.: Receiver operating characteristic (ROC) methodology: the state of the art. Crit Rev Diagn Imaging (1989)"},{"key":"36_CR29","series-title":"AISC","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-30662-4_5","volume-title":"Complex Systems and Dependability","author":"I. Bluemke","year":"2012","unstructured":"Bluemke, I., Tarka, M.: Detection of anomalies in a SOA system by learning algorithms. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Complex Systems and Dependability. AISC, vol.\u00a0170, pp. 69\u201385. Springer, Heidelberg (2012)"},{"issue":"9","key":"36_CR30","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/5.58325","volume":"78","author":"T. Kohonen","year":"1990","unstructured":"Kohonen, T.: The self-organizing map. Proc. IEEE\u00a078(9), 1464\u20131480 (1990)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40925-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T07:53:26Z","timestamp":1558079606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40925-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642409240","9783642409257"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40925-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}