{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T11:04:55Z","timestamp":1747047895356,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/cec.2014.6900644","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T21:35:57Z","timestamp":1412026557000},"page":"2955-2962","source":"Crossref","is-referenced-by-count":12,"title":["Web bots detection using Particle Swarm Optimization based clustering"],"prefix":"10.1109","author":[{"given":"Shafiq","family":"Alam","sequence":"first","affiliation":[]},{"given":"Gillian","family":"Dobbie","sequence":"additional","affiliation":[]},{"given":"Yun Sing","family":"Koh","sequence":"additional","affiliation":[]},{"given":"Patricia","family":"Riddle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2006.10.006"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(00)00131-8"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"},{"journal-title":"Finding Groups in Data An Introduction to Cluster Analysis","year":"1990","author":"kaufman","key":"15"},{"key":"16","first-page":"126","author":"kaufman","year":"2008","journal-title":"Clustering Large Applications (Program CLARA)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1999.754967"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1033770"},{"key":"11","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"ester","year":"1996","journal-title":"KDD"},{"key":"12","first-page":"103","article-title":"BIRCH: An efficient data clustering method for very large databases","author":"zhang","year":"1996","journal-title":"Proceedings of the 1996 ACM SIGMOD international conference on Management of data"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5586152"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/304182.304187"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s101150200013"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0125-5"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2002.1184035"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830498"},{"key":"26","first-page":"170","article-title":"Outlier detection using replicator neural networks","author":"hawkins","year":"2002","journal-title":"Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery DaWaK 2000 London UK Springer-Verlag"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.75"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SIS.2013.6615172"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0522-2_4"},{"journal-title":"Outliers in Statistical Data","year":"1978","author":"barnett","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/956755.956758"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2044008"},{"key":"7","first-page":"392","article-title":"Algorithms for mining distance-based outliers in large datasets","author":"knorr","year":"1998","journal-title":"Proceedings of the 24rd International Conference on Very Large Data Bases VLDB '98"},{"key":"6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.2298\/CSIS0501103H","article-title":"Fp-outlier: Frequent pattern based outlier detection","volume":"2","author":"he","year":"2005","journal-title":"Comput Sci Inf Syst"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502554"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256652"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-008-0371-9"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.29"}],"event":{"name":"2014 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880677\/6900223\/06900644.pdf?arnumber=6900644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:02:50Z","timestamp":1602691370000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6900644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cec.2014.6900644","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}