{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:17:08Z","timestamp":1726060628797},"publisher-location":"Singapore","reference-count":8,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811501838"},{"type":"electronic","value":"9789811501845"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-0184-5_66","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T07:04:06Z","timestamp":1574838246000},"page":"771-782","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Timestamp Anomaly Detection Using IBM Watson IoT Platform"],"prefix":"10.1007","author":[{"given":"Aditi","family":"Katiyar","sequence":"first","affiliation":[]},{"given":"Neha","family":"Aktar","sequence":"additional","affiliation":[]},{"family":"Mayank","sequence":"additional","affiliation":[]},{"given":"K.","family":"Lavanya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"66_CR1","unstructured":"Landage, J., Wankhade, M.P.: Malware and malware detection techniques: a survey. Int. J. Eng. Res. Technol. (IJERT) 2(12) (2013). ISSN: 2278-0181"},{"key":"66_CR2","unstructured":"Idika, N., Mathur, A.P.: A Survey of Malware Detection Techniques, p. 48. Purdue University (2007)"},{"issue":"2","key":"66_CR3","doi-asserted-by":"publisher","first-page":"20","DOI":"10.5815\/ijeme.2018.02.03","volume":"8","author":"R Tahir","year":"2018","unstructured":"Tahir, R.: A study on malware and malware detection techniques. Int. J. Educ. Manage. Eng. 8(2), 20 (2018)","journal-title":"Int. J. Educ. Manage. Eng."},{"key":"66_CR4","doi-asserted-by":"crossref","unstructured":"Sun, J., Lou, Y., Ye, F: Research on anomaly pattern detection in hydrological time series. In: Web Information Systems and Applications Conference (WISA) IEEE Conferences (2017)","DOI":"10.1109\/WISA.2017.73"},{"key":"66_CR5","doi-asserted-by":"crossref","unstructured":"Zang, D., Liu, J., Wang, H.: Markov chain-based feature extraction for anomaly detection in time series and its industrial application. In: Chinese Control and Decision Conference (CCDC) (2018)","DOI":"10.1109\/CCDC.2018.8407286"},{"key":"66_CR6","doi-asserted-by":"crossref","unstructured":"Saxe, J., Berlin, K.: Deep neural network based malware detection using two dimensional binary program features. In: 2015 10th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2015)","DOI":"10.1109\/MALWARE.2015.7413680"},{"key":"66_CR7","doi-asserted-by":"crossref","unstructured":"Dahl, G.E., et al.: Large-scale malware classification using random projections and neural networks. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"66_CR8","doi-asserted-by":"crossref","unstructured":"Golovko, V., et al.: Neural network and artificial immune systems for malware and network intrusion detection. Advances in Machine Learning II, 485\u2013513. Springer, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-05179-1_23"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0184-5_66","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T07:31:02Z","timestamp":1574839862000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0184-5_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9789811501838","9789811501845"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0184-5_66","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}