{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:47:32Z","timestamp":1767138452951,"version":"build-2238731810"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662445082","type":"print"},{"value":"9783662445099","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44509-9_1","type":"book-chapter","created":{"date-parts":[[2014,8,16]],"date-time":"2014-08-16T09:19:15Z","timestamp":1408180755000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Two-Armed Bandit Collective for Hierarchical Examplar Based Mining of Frequent Itemsets with Applications to Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Vegard","family":"Haugland","sequence":"first","affiliation":[]},{"given":"Marius","family":"Kj\u00f8lleberg","sequence":"additional","affiliation":[]},{"given":"Svein-Erik","family":"Larsen","sequence":"additional","affiliation":[]},{"given":"Ole-Christoffer","family":"Granmo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,17]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Yu, P.S.: A new framework for itemset generation. In: PODS 98, Symposium on Principles of Database Systems, Seattle, WA, USA, pp. 18\u201324 (1998)","DOI":"10.1145\/275487.275490"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Washington D.C., May 1993, pp. 207\u2013216 (1993)","DOI":"10.1145\/170035.170072"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1022419032620","volume":"7","author":"B Barber","year":"2003","unstructured":"Barber, B., Hamilton, H.J.: Extracting share frequent itemsets with infrequent subsets. Data Min. Knowl. Disc. 7, 153\u2013185 (2003)","journal-title":"Data Min. Knowl. Disc."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Brin, S., Motwani, R., Ullman, J.D., Tsur, S.: Dynamic itemset counting and implication rules for market basket data. In: SIGMOD 1997, Proceedings ACM SIGMOD International Conference on Management of Data, Tucson, Arizona, USA, May 1997, pp. 255\u2013264 (1997)","DOI":"10.1145\/253262.253325"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10618-006-0059-1","volume":"15","author":"J Han","year":"2007","unstructured":"Han, J., Chen, H., Xin, D., Yan, X.: Frequent pattern mining: current status and future directions. Data Min. Knowl. Disc. 15(1), 55\u201386 (2007)","journal-title":"Data Min. Knowl. Disc."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H., Verkamo, A.I.: Finding interesting rules from large sets of discovered association rules. In: Adam, N.R., Bhargava, B.K., Yesha, Y. (eds.) Third International Conference on Information and Knowledge Management (CIKM\u201994), pp. 401\u2013407. ACM Press (1994)","DOI":"10.1145\/191246.191314"},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 34(4), 579\u2013595 (2000)","journal-title":"Comput. Netw."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: Proceedings of ACM-SAC 2003, pp. 346\u2013350. ACM (2003)","DOI":"10.1145\/952532.952601"},{"key":"1_CR9","volume-title":"Learning Automata: An Introduction","author":"KS Narendra","year":"1989","unstructured":"Narendra, K.S., Thathachar, M.A.L.: Learning Automata: An Introduction. Prentice Hall, Englewood Cliffs (1989)"},{"key":"1_CR10","unstructured":"Srikant, R., Vu, Q., Agrawal, R.: Mining association rules with item constraints. In: Heckerman, D., Mannila, H., Pregibon, D., Uthurusamy, R. (eds.) Proceedings of the 3rd International Conference Knowledge Discovery and Data Mining (KDD-97), pp. 67\u201373. AAAI Press (1997)"},{"key":"1_CR11","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"1998","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (1998)"},{"key":"1_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9052-5","volume-title":"Networks of Learning Automata: Techniques for Online Stochastic Optimization","author":"MAL Thathachar","year":"2004","unstructured":"Thathachar, M.A.L., Sastry, P.S.: Networks of Learning Automata: Techniques for Online Stochastic Optimization. Kluwer Academic Publishers, Dordrecht (2004)"},{"key":"1_CR13","volume-title":"Automaton Theory and Modeling of Biological Systems","author":"ML Tsetlin","year":"1973","unstructured":"Tsetlin, M.L.: Automaton Theory and Modeling of Biological Systems. Academic Press, New York (1973)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Vaarandi, R., Podins, K.: Network IDS alert classification with frequent itemset mining and data clustering. In: Proceedings of the 2010 IEEE Conference on Network and Service Management. IEEE (2010)","DOI":"10.1109\/CNSM.2010.5691262"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-540-30207-0_53","volume-title":"Grid and Cooperative Computing - GCC 2004 Workshops","author":"H Wang","year":"2004","unstructured":"Wang, H., Li, Q.-H., Xiong, H., Jiang, S.-Y.: Mining maximal frequent itemsets for intrusion detection. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds.) GCC 2004 Workshops. LNCS, vol. 3252, pp. 422\u2013429. Springer, Heidelberg (2004)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Wang, K., He, Y., Cheung, D.W.: Mining confident rules without support requirement. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 89\u201396. ACM Press, New York (2001)","DOI":"10.1145\/502585.502601"},{"issue":"1\u20132","key":"1_CR17","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1007652502315","volume":"42","author":"M Zaki","year":"2001","unstructured":"Zaki, M.: Spade: an efficient algorithm for mining frequent sequences. Mach. Learn. 42(1\u20132), 31\u201360 (2001)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Collective Intelligence XIV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44509-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T23:06:55Z","timestamp":1703200015000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44509-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662445082","9783662445099"],"references-count":17,"aliases":["10.1007\/978-3-662-45911-9_1"],"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44509-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"17 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}