{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:01:26Z","timestamp":1742382086861,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/icc.2010.5501984","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T10:22:30Z","timestamp":1278930150000},"page":"1-5","source":"Crossref","is-referenced-by-count":17,"title":["An Information-Theoretic Combining Method for Multi-Classifier Anomaly Detection Systems"],"prefix":"10.1109","author":[{"given":"A. B.","family":"Ashfaq","sequence":"first","affiliation":[]},{"given":"M.","family":"Javed","sequence":"additional","affiliation":[]},{"given":"S. A.","family":"Khayam","sequence":"additional","affiliation":[]},{"given":"H.","family":"Radha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"ref11","article-title":"Multiple Classifier Combination for Character Recognition: Revisiting the Majority Voting System and Its Variations","author":"rahman","year":"2002","journal-title":"Intl Workshop on Doc Analysis Sys"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1049\/ip-vis:20000105","article-title":"enhancing consensus in multiple expert decision fusion","volume":"147","author":"fairhurst","year":"2000","journal-title":"Vision Image and Signal Processing IEE Proceedings-"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1049\/el:19970350","article-title":"exploiting second order information to design a novel multiple expert decision combination platform for pattern classification","volume":"33","author":"rahman","year":"1997","journal-title":"Electronics Letters"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"ref16","article-title":"Fast detection of scanning worm infections","author":"schechter","year":"2004","journal-title":"RAID"},{"key":"ref17","first-page":"2001","article-title":"PHAD: Packet Header Anomaly Detection for Indentifying Hostile Network Traffic","author":"mahoney","year":"2001","journal-title":"Technical Report Florida Tech"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/952589.952601"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"ref4","article-title":"Combining Multiple Classifiers: Diversify with Boosting and Combining by Stacking","volume":"1","author":"hatami","year":"2007","journal-title":"Int J Comput Sci Netw Secur (IJCSNS)"},{"key":"ref3","article-title":"Empirical Analysis of Rate Limiting Mechanisms","author":"wong","year":"2005","journal-title":"RAID"},{"journal-title":"WiSNet LAB Dataset","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/21.155943"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2006.10.002"},{"journal-title":"LBNL\/ICSI Enterprise Tracing Project","year":"0","key":"ref7"},{"key":"ref2","article-title":"A Comparative Evaluation of Anomaly Detectors under Portscan Attacks","author":"ashfaq","year":"2008","journal-title":"RAID"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(03)00177-4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330147"},{"journal-title":"Next Generation Intrusion Detection Expert System (NIDES)","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111330"}],"event":{"name":"ICC 2010 - 2010 IEEE International Conference on Communications","start":{"date-parts":[[2010,5,23]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2010,5,27]]}},"container-title":["2010 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5497983\/5501741\/05501984.pdf?arnumber=5501984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T06:43:12Z","timestamp":1497854592000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5501984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icc.2010.5501984","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}