{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:03:30Z","timestamp":1730221410057,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/eurocon.2013.6624965","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:48:16Z","timestamp":1382032096000},"page":"52-59","source":"Crossref","is-referenced-by-count":3,"title":["Intelligent risk detection and analysis tools for critical infrastructure protection"],"prefix":"10.1109","author":[{"given":"S. L. P.","family":"Yasakethu","sequence":"first","affiliation":[]},{"given":"J.","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"A.","family":"Graziano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1162\/089976603321891855"},{"key":"18","article-title":"Information fusion and response guidance","volume":"17","author":"dasey","year":"2007","journal-title":"Lincoln Laboratory Journal"},{"key":"15","first-page":"3077","article-title":"Improvmg one-class SVM for anomaly detection","author":"li","year":"2003","journal-title":"Proceedmgs of the Second International Conference on Machme Learning and Cybernetics"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"journal-title":"K-Mean Clustering Tutorials","year":"2005","author":"teknomo","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2007.15.2.223"},{"key":"11","article-title":"K-nearest neighbour classifiers","author":"cunningham","year":"2007","journal-title":"Technical Report UCD-CSI-2007-4"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2008.016095"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15479-9_33"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.06.011"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009715923555"},{"journal-title":"Computer Security A Machine Learning Approach Technical Report","year":"2008","author":"sabnam","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPENG.2010.28"},{"year":"0","key":"4"},{"key":"9","article-title":"Artificial neural networks for beginners","author":"gershenson","year":"0","journal-title":"Cognitive and Computmg Sciences"},{"journal-title":"Network Security Essentials Applications and Standards","year":"2006","author":"stallmgs","key":"8"}],"event":{"name":"IEEE EUROCON 2013","start":{"date-parts":[[2013,7,1]]},"location":"Zagreb, Croatia","end":{"date-parts":[[2013,7,4]]}},"container-title":["Eurocon 2013"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596534\/6624951\/06624965.pdf?arnumber=6624965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:58:32Z","timestamp":1490227112000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6624965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/eurocon.2013.6624965","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}