{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:18:22Z","timestamp":1729621102223,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/fskd.2014.6980852","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T21:43:41Z","timestamp":1419975821000},"page":"312-316","source":"Crossref","is-referenced-by-count":0,"title":["Computer anomaly detection based on the moving averages of the power series distributed random sequence"],"prefix":"10.1109","author":[{"given":"Deqiang","family":"Chen","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2012.6194493"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1504\/IJCC.2012.046711"},{"key":"15","volume":"165","author":"johnson","year":"1997","journal-title":"Discrete Multivariate Distributions"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.08.002"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177703767"},{"key":"11","doi-asserted-by":"crossref","first-page":"2042","DOI":"10.1016\/j.asoc.2010.07.002","article-title":"Neural visualization of network traffic data for intrusion detection","volume":"11","author":"corchado","year":"2011","journal-title":"Applied Soft Computing"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2010.5529697"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.78"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.56"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.46"},{"journal-title":"RISM - Reputation Based Intrusion Detection System for Mobile Ad Hoc Networks","year":"2013","author":"trivedi","key":"23"},{"key":"24","first-page":"499","article-title":"The applications of hidden markov models with states depending on observations to computer intrusion detection","volume":"13","author":"chen","year":"2011","journal-title":"Energy Procedia"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2159818"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2009.89"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_10"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2052533"},{"key":"3","first-page":"130","author":"lee","year":"2001","journal-title":"Information-theoretic Measures for Anomaly Detection"},{"key":"2","article-title":"Automatic incident detection through video image processing","volume":"34","author":"michalopoulos","year":"1993","journal-title":"Traffic Engineering and Control"},{"key":"10","article-title":"Fuzzy approach for intrusion detection system: A survey","volume":"4","author":"bhattacharjee","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"1","first-page":"120","author":"forrest","year":"1996","journal-title":"A Sense of Self for Unix Processes"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2004.833765"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1144\/GSL.QJEG.1997.030.P4.02"},{"journal-title":"Integration of probe vehicle and induction loop data Estimation of travel times and automatic incident detection","year":"1996","author":"westerman","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"8","first-page":"167","article-title":"DIDS (distributed intrusion detection system)-motivation, architecture, and an early prototype","author":"snapp","year":"1991","journal-title":"Proceedings of the 14th National Computer Security Conference"}],"event":{"name":"2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen, China","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6962871\/6980796\/06980852.pdf?arnumber=6980852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:19:27Z","timestamp":1602688767000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6980852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/fskd.2014.6980852","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}