{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:26:20Z","timestamp":1759134380390,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/emeit.2011.6023097","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T20:24:52Z","timestamp":1318451092000},"page":"3897-3900","source":"Crossref","is-referenced-by-count":5,"title":["Application of web log mining in local area network security"],"prefix":"10.1109","author":[{"given":"Zhongkui","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hui","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Mingjun","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Jiongzhao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"222","article-title":"Distributed algorithms for distance-based and density-based outliers","volume":"24","author":"wang daoping","year":"2008","journal-title":"Microcomputer World"},{"key":"2","article-title":"A new approach for reactive web usageeata processing","author":"murat","year":"2006","journal-title":"Proc of the 22nd Intenation Conference on Data Workshops"},{"journal-title":"Principle and Algorithm of Data Mining","year":"0","author":"shao","key":"1"},{"key":"7","first-page":"35","article-title":"Outlier detection aogorithms baese on web log files","volume":"38","author":"chen","year":"2010","journal-title":"Computer & Digital Engineering"},{"journal-title":"Tracking and Data Association","year":"1988","author":"bar-shanlom","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CHICC.2006.280608"},{"journal-title":"Study of Outlier Data Mining Algorithm Based on Web Service Secruity","year":"2007","author":"yang","key":"4"}],"event":{"name":"Mechanical Engineering and Information Technology (EMEIT)","start":{"date-parts":[[2011,8,12]]},"location":"Harbin, Heilongjiang, China","end":{"date-parts":[[2011,8,14]]}},"container-title":["Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5996364\/6023088\/06023097.pdf?arnumber=6023097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:43:05Z","timestamp":1490071385000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6023097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/emeit.2011.6023097","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}