{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T22:01:48Z","timestamp":1746223308420,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/apnoms.2011.6077031","type":"proceedings-article","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:14:09Z","timestamp":1321546449000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Combining density-based clustering and wavelet methods for internal systems anomaly detection"],"prefix":"10.1109","author":[{"given":"Shun-Te","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shiou-Jing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yi-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2041808"},{"key":"ref11","article-title":"Statistical and signal-based network traffic recognition for anomaly detection","author":"chora \u00e5","year":"2011","journal-title":"Expert Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330147"},{"journal-title":"Data Mining Concepts and Techniques","year":"2006","author":"han","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009745219419"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"ref16","volume":"5","author":"greene","year":"2003","journal-title":"Econometric Analysis"},{"journal-title":"Digital Signal Processing Using MATLAB","year":"2011","author":"ingle","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref19","article-title":"Wavelet toolbox user's guide","author":"misiti","year":"2005","journal-title":"The MathWorks"},{"journal-title":"Wavelet Methods for Time Series Analysis","year":"2006","author":"percival","key":"ref4"},{"journal-title":"Time Series Analysis","year":"2008","author":"madsen","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.20-23.1378"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815473"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/837601"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2010.5485392"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1670679.1670680"},{"journal-title":"Software Testing Techniques","year":"2002","author":"beizer","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-004-5581-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883613"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.11.017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0477(1998)079<0061:APGTWA>2.0.CO;2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/3516.828591"}],"event":{"name":"2011 13th Asia-Pacific Network Operations and Management Symposium (APNOMS)","start":{"date-parts":[[2011,9,21]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,9,23]]}},"container-title":["2011 13th Asia-Pacific Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6069626\/6076947\/06077031.pdf?arnumber=6077031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:30:05Z","timestamp":1490103005000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6077031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/apnoms.2011.6077031","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}