{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:21:11Z","timestamp":1772644871396,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s10922-010-9165-x","type":"journal-article","created":{"date-parts":[[2010,4,30]],"date-time":"2010-04-30T04:32:35Z","timestamp":1272601955000},"page":"265-282","source":"Crossref","is-referenced-by-count":9,"title":["Intrusion Detection by Ellipsoid Boundary"],"prefix":"10.1007","volume":"18","author":[{"given":"Mohammad","family":"GhasemiGol","sequence":"first","affiliation":[]},{"given":"Reza","family":"Monsefi","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Sadoghi-Yazdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,1]]},"reference":[{"key":"9165_CR1","unstructured":"Ghosh, K.A., Schwartzbard, A.: Study in using neural networks for anomaly and misuse detection. In: Proceedings of the 8th SENIX security symposium, pp. 131\u2013142. Washington, DC, 23\u201326 August 1999"},{"key":"9165_CR2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. 16, 507\u2013521 (2007)","journal-title":"VLDB J."},{"key":"9165_CR3","unstructured":"Zheng, J., Hu, M.: Intrusion detection of DoS\/DDoS and probing attacks for web services. In: Proceedings of the WAIM, pp. 333\u2013344. Hangzhou, China, LNCS, 3739, 11\u201313 Oct 2005"},{"issue":"3","key":"9165_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K Ilgun","year":"1995","unstructured":"Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Software Eng. 21(3), 181\u2013199 (1995)","journal-title":"IEEE Trans. Software Eng."},{"key":"9165_CR5","unstructured":"Marchette, D.: A statistical method for profiling network traffic. In: Proceedings of the first USENIX workshop on intrusion detection and network monitoring, pp. 119\u2013128. Santa Clara, California, USA, 9\u201312 April 1999"},{"key":"9165_CR6","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection: support vector machines and neural networks. In: Proceedings of the IEEE international joint conference on neural networks (ANNIE), pp. 1702\u20131707. St. Louis (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"9165_CR7","volume-title":"One-Class Classification: Concept Learning in the Absence of Counter-Examples","author":"DMJ Tax","year":"2001","unstructured":"Tax, D.M.J.: One-Class Classification: Concept Learning in the Absence of Counter-Examples. Technische Universiteit Delft, Netherlands (2001)"},{"key":"9165_CR8","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1214\/aoms\/1177704472","volume":"33","author":"E Parzen","year":"1962","unstructured":"Parzen, E.: On estimation of a probability density function and mode. Ann. Math. Stat. 33, 1065\u20131076 (1962)","journal-title":"Ann. Math. Stat."},{"key":"9165_CR9","unstructured":"Bishop, C.: Neural Networks for Pattern Recognition. Oxford University Press, Walton Street, Oxford OX2 6DP (1995)"},{"key":"9165_CR10","doi-asserted-by":"crossref","unstructured":"Ypma, A., Duin, R.P.W.: Support objects for domain approximation. In: Proceedings of the 8th international conference on artificial neural networks (ICANN\u201998), Skovde, Sweden, pp. 719\u2013724. Springer, Berlin, 2\u20134 Sept 1998","DOI":"10.1007\/978-1-4471-1599-1_110"},{"key":"9165_CR11","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DMJ Tax","year":"2004","unstructured":"Tax, D.M.J., Duin, R.P.W.: Support vector data description. Mach. Learn. 54, 45\u201366 (2004)","journal-title":"Mach. Learn."},{"key":"9165_CR12","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1016\/S0167-8655(99)00087-2","volume":"20","author":"DMJ Tax","year":"1999","unstructured":"Tax, D.M.J., Duin, R.P.W.: Support vector domain description. Pattern Recognit. Lett. 20, 1191\u20131199 (1999)","journal-title":"Pattern Recognit. Lett."},{"key":"9165_CR13","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.patcog.2008.07.003","volume":"42","author":"SM Guo","year":"2009","unstructured":"Guo, S.M., Chen, L.C., Tsai, J.S.H.: A boundary method for outlier detection based on support vector domain description. Pattern Recognit. 42, 77\u201383 (2009)","journal-title":"Pattern Recognit."},{"key":"9165_CR14","unstructured":"Liu, Y., Gururajan, S., Cukic, B., Menzies, T., Napolitano, M.: Validating an online adaptive system using SVDD. In: Proceedings of the 15th IEEE international conference on tools with artificial intelligence (ICTAI\u201903), pp. 384\u2013388. Sacramento, California, USA, 3\u20135 Nov 2003"},{"key":"9165_CR15","doi-asserted-by":"crossref","unstructured":"Ji, R., Liu, D., Wu, M., Liu, J.: The application of SVDD in gene expression data clustering. In: Proceedings of the 2nd international conference on bioinformatics and biomedical engineering (ICBBE\u201908), pp. 371\u2013374. Shanghai, China, 16\u201318 May 2008","DOI":"10.1109\/ICBBE.2008.94"},{"key":"9165_CR16","doi-asserted-by":"crossref","unstructured":"Yu, X., Dementhon, D., Doermann, D.: Support vector data description for image categorization from internet images. In: Proceedings of the 19th international conference on pattern recognition (ICPR\u201908), Tampa, Florida, USA, 8\u201311 Dec 2008","DOI":"10.1109\/ICPR.2008.4761715"},{"key":"9165_CR17","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.eswa.2007.09.053","volume":"36","author":"HW Cho","year":"2009","unstructured":"Cho, H.W.: Data description and noise filtering based detection with its application and performance comparison. Expert Syst. Appl. 36, 434\u2013441 (2009)","journal-title":"Expert Syst. Appl."},{"key":"9165_CR18","doi-asserted-by":"crossref","unstructured":"Jiaomin,L., Zhenzhou,W., Xinchun, F., Jing, W.: Intrusion detection technology based on SVDD. In: Proceedings of the 2nd international conference on intelligent networks and intelligent systems (ICINIS\u201909), Tianjin, Chaina, 1\u20133 Nov 2009","DOI":"10.1109\/ICINIS.2009.13"},{"key":"9165_CR19","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59904-708-9","volume-title":"Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection","author":"Y Wang","year":"2009","unstructured":"Wang, Y.: Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. Inf Sci Ref, Hershey, New York (2009)"},{"key":"9165_CR20","unstructured":"Amoroso, E.: Intrusion detection: an introduction to internet surveillance, correlation, trace back, traps, and response, 1st edn. Intrusion NetBooks (1999)"},{"issue":"4","key":"9165_CR21","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J Kim","year":"2007","unstructured":"Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection\u2014A review. Nat. Comput. Int. J. 6(4), 413\u2013466 (2007)","journal-title":"Nat. Comput. Int. J."},{"key":"9165_CR22","unstructured":"Northcutt, S., Novak, J.: Network Intrusion Detection. New Riders, 3rd edn. (2003)"},{"key":"9165_CR23","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1162\/089976698300017467","volume":"10","author":"B Scholkopf","year":"1999","unstructured":"Scholkopf, B., Smola, A.J., Muller, K.: Nonlinear component analysis as a kernel eigenvalue problem. Neural Comput. 10, 1299\u20131319 (1999)","journal-title":"Neural Comput."},{"key":"9165_CR24","unstructured":"Haykin, S.: Nerual Networks a Comprehensive Foundation. Prentic Hall (1999)"},{"key":"9165_CR25","unstructured":"Blake, C.L., Merz, C.J.: UCI repository of machine learning databases. Department of Information and Computer Sciences, University of California, Irvine, Available at http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"9165_CR26","doi-asserted-by":"crossref","unstructured":"GhasemiGol, M., Monsefi, R., Sadoghi-Yazdi, H.: Ellipse Support Vector Data Description. EANN 2009, Springer, CCIS 43, pp. 257\u2013268 (2009)","DOI":"10.1007\/978-3-642-03969-0_24"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9165-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-010-9165-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9165-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T04:55:34Z","timestamp":1559451334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-010-9165-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,1]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9165"],"URL":"https:\/\/doi.org\/10.1007\/s10922-010-9165-x","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,5,1]]}}}