{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T05:08:41Z","timestamp":1767676121050},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2004,4,19]],"date-time":"2004-04-19T00:00:00Z","timestamp":1082332800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowledge and Information Systems"],"published-print":{"date-parts":[[2004,9]]},"DOI":"10.1007\/s10115-003-0132-7","type":"journal-article","created":{"date-parts":[[2004,4,16]],"date-time":"2004-04-16T10:23:19Z","timestamp":1082110999000},"page":"507-527","source":"Crossref","is-referenced-by-count":71,"title":["Using artificial anomalies to detect unknown and known network intrusions"],"prefix":"10.1007","volume":"6","author":[{"given":"W.","family":"Fan","sequence":"first","affiliation":[]},{"given":"M.","family":"Miller","sequence":"additional","affiliation":[]},{"given":"S.","family":"Stolfo","sequence":"additional","affiliation":[]},{"given":"W.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"P.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,4,19]]},"reference":[{"key":"132_CRCohen-95","doi-asserted-by":"crossref","unstructured":"Cohen W (1995) Fast effective rule induction. In: Proceedings of 12th international conference on machine learning (ICML-95), Kaufmann, Tahoe City, CA, pp 115\u2013123","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"132_CRFan-et-al-ECML00","doi-asserted-by":"crossref","unstructured":"Fan W, Lee W, Stolfo S, Miller M (2000) A multiple model approach for cost-sensitive intrusion detection. In: Proceedings of 11th European conference on machine learning (ECML-00), Barcelona, Spain, pp 142\u2013153","DOI":"10.1007\/3-540-45164-1_15"},{"key":"132_CRForrest-et-al-96","doi-asserted-by":"crossref","unstructured":"Forrest S, Hofmeyr SA, Somayaji A, Longstaff TA (1996) A sense of self for UNIX processes. In: Proceedings of IEEE symposium on security and privacy, pp 120\u2013128","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"132_CRGhosh-Schwartzbard-99","unstructured":"Ghosh AK, Schwartzbard A (1999) A study in using neural networks for anomaly and misuse detection. In: Proceedings of USENIX security symposium, pp 51\u201362"},{"key":"132_CRJavitz-Valdes-91","doi-asserted-by":"crossref","unstructured":"Javitz H, Valdes A (1991) The SRI IDES statistical anomaly detector. In: Proceedings of IEEE symposium on security and privacy, p 1991","DOI":"10.1109\/RISP.1991.130799"},{"key":"132_CRKubat-Matwin-97","unstructured":"Kubat M, Matwin S (1997) Addressing the curse of imbalanced training sets: one sided selection. In: Proceedings of 14th international conference on machine learning (ICML-97), Kaufmann, Nashville, TN, pp 179\u2013186"},{"key":"132_CRLane-Brodley-98","unstructured":"Lane T, Brodley C (1998) Approaches to online learning and concept drift for user identification in computer security. In: Proceedings of 4th international conference on knowledge discovery and data mining (KDD-98), pp 259\u2013263"},{"key":"132_CRLee-RV-Thesis","unstructured":"Lee W (1999) A data mining framework for constructing features and models for intrusion detection systems. Thesis, Columbia University"},{"key":"132_CRLee-RV-Xiang-2001","unstructured":"Lee W, Xiang D (2001) Information-theoretic measures for anomaly detection. In: 2001 IEEE symposium on security and privacy, Oakland, CA, pp 130\u2013143"},{"key":"132_CRMaxion-RV-2000","doi-asserted-by":"crossref","unstructured":"Maxion RA, Tan KM (2000) Benchmarking anomaly-based detection systems. In: International conference on dependable systems and networks, pp 623\u2013630","DOI":"10.1109\/ICDSN.2000.857599"},{"key":"132_CRNeumann-Porras-99","unstructured":"Neumann PG, Porras PA (1999) Experiments with EMERALD to date. In: Proceedings of 1999 USENIX workshop on intrusion detection, pp 73\u201380"},{"key":"132_CRNigam-et-al-98","unstructured":"Nigam K, McCallum A, Thrun S, Mitchell T (1998) Learning to classify text from labeled and unlabeled documents. In: Proceedings of 15th national conference on artificial intelligence (AAAI-98), pp 792\u2013799"},{"key":"132_CRbsm","unstructured":"SunSoft (1995) SunSHIELD Basic Security module guide. SunSoft, Mountain View, CA"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-003-0132-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-003-0132-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-003-0132-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T06:10:13Z","timestamp":1559110213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-003-0132-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4,19]]},"references-count":13,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2004,9]]}},"alternative-id":["132"],"URL":"https:\/\/doi.org\/10.1007\/s10115-003-0132-7","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,4,19]]}}}