{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T05:49:07Z","timestamp":1774590547351,"version":"3.50.1"},"reference-count":112,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3452168","type":"journal-article","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T17:46:33Z","timestamp":1725039993000},"page":"124943-124973","source":"Crossref","is-referenced-by-count":32,"title":["Comparing Threshold Selection Methods for Network Anomaly Detection"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1243-7149","authenticated-orcid":false,"given":"Adrian","family":"Komadina","sequence":"first","affiliation":[{"name":"Laboratory for Information Security and Privacy, Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia"}]},{"given":"Mislav","family":"Martini\u0107","sequence":"additional","affiliation":[{"name":"CS Computer Systems, Zagreb, Croatia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-2859","authenticated-orcid":false,"given":"Stjepan","family":"Gro\u0161","sequence":"additional","affiliation":[{"name":"Laboratory for Information Security and Privacy, Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4866-1399","authenticated-orcid":false,"given":"\u017deljka","family":"Mihajlovi\u0107","sequence":"additional","affiliation":[{"name":"Department of Electronics, Microelectronics, Computer and Intelligent System, Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.151"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932769"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2018.00014"},{"key":"ref11","volume-title":"Kulikdm\/Pythresh: V0.3.6","author":"Kulik","year":"2024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01400-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3027736"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3140058"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3161925"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/75577.75582"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.839903"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/34.62613"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2000.886039"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0047"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1754414.1754419"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/cc3000"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/1536867X20909693"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330147"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/bimj.200710415"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/18.923720"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897806"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223761"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1004_07"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108500"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_125"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00312"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2021.23013"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2015.09.02"},{"key":"ref37","first-page":"1","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zong"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00088"},{"key":"ref39","article-title":"Classification-based anomaly detection for general data","author":"Bergman","year":"2020","journal-title":"arXiv:2005.02359"},{"key":"ref40","article-title":"A revealing large-scale evaluation of unsupervised anomaly detection algorithms","author":"Alvarez","year":"2022","journal-title":"arXiv:2204.09825"},{"key":"ref41","volume-title":"Exploratory Data Analysis","volume":"2","author":"Tukey","year":"1977"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10687-017-0295-3"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103167"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06689-x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2017.11.010"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.2021.3075897"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2933731"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.013"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083699"},{"key":"ref51","volume-title":"Introduction to Statistical Quality Control","author":"Montgomery","year":"2020"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"ref53","volume-title":"Goodness-of-Fit Tests and Model Validity","author":"Huber-Carol","year":"2012"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706788"},{"issue":"1","key":"ref55","first-page":"21","article-title":"Power comparisons of Shapiro\u2013Wilk, Kolmogorov\u2013Smirnov, Lilliefors and Anderson\u2013Darling tests","volume":"2","author":"Razali","year":"2011","journal-title":"J. Stat. Model. Anal."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.2307\/2281537"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_118"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1038\/s41592-019-0686-2"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1017\/9781108679930"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-696-4_7"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098144"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176996548"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176343003"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1201\/9781315140919"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20182300037"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105187"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164087"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICADIWT.2014.6814687"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.5120\/15890-5059"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2016.7754534"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1086\/296032"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20757-0_4"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/APARM49247.2020.9209368"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"ref78","volume-title":"Practical Nonparametric Statistics","author":"Conover","year":"1999"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323766"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-007-0064-z"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2894334"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823921"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2870666"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1137\/1119078"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452782"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1214\/12-sts402"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1142\/S0219691321500041"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029258"},{"key":"ref90","article-title":"Sparse auto-regressive: Robust estimation of AR parameters","author":"Joneidi","year":"2013","journal-title":"arXiv:1306.3317"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1515\/dema-2021-0041"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.12720\/joig.2.2.113-116"},{"key":"ref93","article-title":"Periodicity detection of outlier sequences using constraint based pattern tree with MAD","author":"N","year":"2015","journal-title":"arXiv:1507.01685"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1002\/cpa.3160300502"},{"issue":"4","key":"ref95","first-page":"263","article-title":"Using the mollifier method to characterize datasets and models: The case of the universal soil loss equation","volume":"3","author":"Keyzer","year":"1997","journal-title":"ITC J."},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/app112411854"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3_3"},{"key":"ref98","first-page":"20685","article-title":"Likelihood regret: An out-of-distribution detection score for variational auto-encoder","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Xiao"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2461912.2461916"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05960-5"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2109"},{"key":"ref102","volume-title":"Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning","author":"Lyon","year":"2009"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3578357.3589457"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/s24082636"},{"key":"ref105","volume-title":"AnomalyThresholdSelector","author":"Komadina","year":"2024"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159580"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/0005-2795(75)90109-9"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1186\/s13040-021-00244-z"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1186\/s12864-019-6413-7"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.3390\/en16041947"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.40"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2019.11306"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10659855.pdf?arnumber=10659855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T07:20:05Z","timestamp":1726730405000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10659855\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":112,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3452168","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}