{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T12:00:35Z","timestamp":1770724835534,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811358258","type":"print"},{"value":"9789811358265","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_15","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"211-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study"],"prefix":"10.1007","author":[{"given":"Mohiuddin","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Al-Sakib Khan","family":"Pathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Yu, R., He, X., Liu, Y.: Glad: group anomaly detection in social media analysis. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2014, pp. 372\u2013381. ACM, New York (2014)","DOI":"10.1145\/2623330.2623719"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2015","unstructured":"Ahmed, M., Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2015)","journal-title":"J. Netw. Comput. Appl."},{"key":"15_CR3","first-page":"3","volume-title":"The State of the Art in Intrusion Prevention and Detection","author":"Mohiuddin Ahmed","year":"2013","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: Outlier detection. In: The State of the Art in Intrusion Prevention and Detection, pp. 3\u201321. CRC Press, New York (2014)"},{"key":"15_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers (Monographs on Statistics and Applied Probability)","author":"D Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers (Monographs on Statistics and Applied Probability), 1st edn. Springer, Dordrecht (1980). \n                  https:\/\/doi.org\/10.1007\/978-94-015-3994-4","edition":"1"},{"issue":"2","key":"15_CR5","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1111\/j.1467-9671.2006.00256.x","volume":"10","author":"T Cheng","year":"2006","unstructured":"Cheng, T., Li, Z.: A multiscale approach for spatio-temporal outlier detection. Trans. GIS 10(2), 253\u2013263 (2006)","journal-title":"Trans. GIS"},{"issue":"2","key":"15_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: Lof: identifying density-based local outliers. SIGMOD Rec. 29(2), 93\u2013104 (2000)","journal-title":"SIGMOD Rec."},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1145\/335191.335437","volume":"29","author":"S Ramaswamy","year":"2000","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. SIGMOD Rec. 29(2), 427\u2013438 (2000)","journal-title":"SIGMOD Rec."},{"key":"15_CR8","unstructured":"Muandet, K., Sch\u00f6lkopf, B.: One-class support measure machines for group anomaly detection. CoRR, abs\/1303.0309(2013)"},{"issue":"4","key":"15_CR9","first-page":"1","volume":"1","author":"A Struyf","year":"1997","unstructured":"Struyf, A., Hubert, M., Rousseeuw, P.: Clustering in an object-oriented environment. J. Stat. Softw. 1(4), 1\u201330 (1997)","journal-title":"J. Stat. Softw."},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/s40745-018-0149-0","volume":"5","author":"M Ahmed","year":"2018","unstructured":"Ahmed, M.: Collective anomaly detection techniques for network traffic analysis. Ann. Data Sci. 5, 497\u2013512 (2018)","journal-title":"Ann. Data Sci."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Mahmood, A.: Network traffic analysis based on collective anomaly detection. In: 9th IEEE International Conference on Industrial Electronics and Applications, pp. 1141\u20131146. IEEE (2014)","DOI":"10.1109\/ICIEA.2014.6931337"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s40745-015-0035-y","volume":"2","author":"M Ahmed","year":"2015","unstructured":"Ahmed, M., Mahmood, A.N.: Novel approach for network traffic pattern analysis using clustering-based collective anomaly detection. Ann. Data Sci. 2(1), 111\u2013130 (2015)","journal-title":"Ann. Data Sci."},{"key":"15_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-319-23802-9_17","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"M Ahmed","year":"2015","unstructured":"Ahmed, M., Mahmood, A.N.: Network traffic pattern analysis using improved information theoretic co-clustering based collective anomaly detection. In: Tian, J., Jing, J., Srivatsa, M. (eds.) SecureComm 2014. LNICSSITE, vol. 153, pp. 204\u2013219. Springer, Cham (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-319-23802-9_17"},{"issue":"9","key":"15_CR14","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.3571051","volume":"50","author":"M Ahmed","year":"2017","unstructured":"Ahmed, M.: Thwarting dos attacks: a framework for detection based on collective anomalies and clustering. Computer 50(9), 76\u201382 (2017)","journal-title":"Computer"},{"issue":"3","key":"15_CR15","first-page":"1","volume":"15","author":"M Ahmed","year":"2015","unstructured":"Ahmed, M., Anwar, A., Mahmood, A.N., Shah, Z., Maher, M.J.: An investigation of performance analysis of anomaly detection techniques for big data in scada systems. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 15(3), 1\u201316 (2015)","journal-title":"EAI Endorsed Trans. Ind. Netw. Intell. Syst."},{"key":"15_CR16","unstructured":"Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-eighth Australasian Conference on Computer Science - Volume 38, ACSC 2005, Darlinghurst, Australia, pp. 333\u2013342. Australian Computer Society, Inc. (2005)"},{"issue":"4","key":"15_CR17","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1561\/2000000039","volume":"7","author":"L Deng","year":"2014","unstructured":"Deng, L., Yu, D.: Deep learning: methods and applications. Found. Trends Signal Process. 7(4), 197\u2013387 (2014)","journal-title":"Found. Trends Signal Process."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Choudhury, N., Uddin, S.: Anomaly detection on big data in financial markets. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, ASONAM 2017, pp. 998\u20131001. ACM, New York (2017)","DOI":"10.1145\/3110025.3119402"},{"key":"15_CR19","unstructured":"Deep Learning with Rapid Miner. \n                  https:\/\/docs.rapidminer.com\/studio\/operators\/modeling\/predictive\/neural_nets\/deep_learning.html\n                  \n                . Accessed 24 Aug 2017"},{"key":"15_CR20","unstructured":"Candel, A., Parmar, V., LeDell, E., Arora, A.: Deep Learning with H2O (2016). \n                  https:\/\/www.h2o.ai\/resources\/\n                  \n                . Accessed 24 Aug 2017"},{"key":"15_CR21","volume-title":"Deep Learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016). \n                  http:\/\/www.deeplearningbook.org"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 dataset. In: Proceedings of the 2nd IEEE International Conference on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 53\u201358. IEEE Press, Piscataway (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"1\u20133","key":"15_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. A Global Perspect. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inf. Secur. J. A Global Perspect."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:51:03Z","timestamp":1558396263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}