{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:45:37Z","timestamp":1729665937842,"version":"3.28.0"},"reference-count":58,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/bigdata.2015.7363967","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T16:36:21Z","timestamp":1451320581000},"page":"1910-1916","source":"Crossref","is-referenced-by-count":2,"title":["A distributed framework for supporting adaptive ensemble-based intrusion detection"],"prefix":"10.1109","author":[{"given":"Alfredo","family":"Cuzzocrea","sequence":"first","affiliation":[]},{"given":"Gianluigi","family":"Folino","sequence":"additional","affiliation":[]},{"given":"Pietro","family":"Sabatino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345484"},{"key":"ref38","first-page":"655","article-title":"Power iteration clustering","author":"lin","year":"2010","journal-title":"Proceedings of the 27th International Conference on Machine Learning (ICML-10)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1162\/089976603321780317"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.77"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2006.04.006"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-69935-6_13"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1031596100"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"2319","DOI":"10.1126\/science.290.5500.2319","article-title":"A global geometric framework for nonlinear dimensionality reduction","volume":"290","author":"tenenbaum","year":"2000","journal-title":"Science"},{"key":"ref35","first-page":"53","article-title":"Geometric methods for feature extraction and dimensional reduction-a guided tour","author":"burges","year":"2010","journal-title":"Data Mining and Knowledge Discovery Handbook"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1016\/j.jcss.2007.08.006","article-title":"Towards a theoretical foundation for laplacian-based manifold methods","volume":"74","year":"2008","journal-title":"Journal of Computer and System Sciences"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0500334102"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0500334102"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.223"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.01.012","article-title":"A survey of intrusion detection in wireless network applications","volume":"42","year":"2014","journal-title":"Computer Communications"},{"key":"ref1","first-page":"55:1","article-title":"A survey of intrusion detection techniques for cyber-physical systems","volume":"46","author":"mitchell","year":"2013","journal-title":"ACM Comput Surv"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2007.07.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2007.01.001"},{"article-title":"Chaotic mining: Knowledge discovery using the fractal dimension (extended abstract)","year":"0","author":"barbara","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.016"},{"key":"ref23","article-title":"Application of thermodynamics to the reduction of data generated by a non-standard system","author":"ford","year":"2004","journal-title":"arXiv preprint cond-mat\/0402325"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.008"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.6169144"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2011.2160459"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2008326"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37574-3_8"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2009.029076"},{"key":"ref56","first-page":"1666","article-title":"A secure multiparty computation privacy preserving OLAP framework over distributed XML data","year":"2010","journal-title":"Proceedings of the 2010 ACM Symposium on Applied Computing (SAC)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.02.004"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-010-3.ch241"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2513591.2527071"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.comcom.2008.11.012","article-title":"Intrusion detection alarms reduction using root cause analysis and clustering","volume":"32","author":"al-mamory","year":"2009","journal-title":"Computer Communications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2006.10.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-010-9101-6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/01969727408546059"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/978-3-319-10840-7_32","article-title":"Ensemble-distributed approach in classification problem solution for intrusion detection systems","author":"bukhtoyarov","year":"2014","journal-title":"Intelligent Data Engineering and Automated Learning - IDEAL 2014&#x2013;15th International Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2716260"},{"key":"ref14","first-page":"2015","article-title":"The intrusion detection message exchange format (idmef)","author":"debar","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2239309"},{"key":"ref17","first-page":"275","article-title":"Fractal lyapunov exponent based anomaly detection of network traffic","volume":"4","author":"ren","year":"2011","journal-title":"International Journal of Advancements in Computing Technology(IJACT)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/978-3-540-71605-1_15","volume":"4445","author":"folino","year":"2007","journal-title":"Genetic Programming Ser Lecture Notes in Computer Science"},{"article-title":"Network traffic anomaly detection through correlation integrals","year":"0","author":"luo","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.050113.00191"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011079199"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.04.012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.09.010"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.136"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2007.03.001"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116037"},{"journal-title":"Anomaly Detection and Classification Via Diffusion Processes in Hyper-Networks","year":"2009","author":"david","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16549-3_5"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1136"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1979.4766909"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1111\/j.2044-8317.1976.tb00714.x","article-title":"Quadrati analysis strategy","volume":"29","author":"hubert","year":"1976","journal-title":"British Journal of Mathematical and Statistical Psychology"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/34.85677"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"}],"event":{"name":"2015 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2015,10,29]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2015,11,1]]}},"container-title":["2015 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347101\/7363706\/07363967.pdf?arnumber=7363967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T20:36:22Z","timestamp":1567456582000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7363967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2015.7363967","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}