{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T23:00:03Z","timestamp":1746054003814,"version":"3.32.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icccn.2005.1523864","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:51:59Z","timestamp":1160581919000},"page":"263-268","source":"Crossref","is-referenced-by-count":3,"title":["Detecting denial-of-service attacks with incomplete audit data"],"prefix":"10.1109","author":[{"given":"A.","family":"Patcha","sequence":"first","affiliation":[]},{"family":"Jung-Min Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Statistical analysis with missing data","year":"1987","author":"little","key":"ref10"},{"article-title":"Missing Data Techniques","year":"0","author":"lynch","key":"ref11"},{"key":"ref12","article-title":"PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic","author":"mahoney","year":"2001","journal-title":"Tech Report CS-2001-2"},{"key":"ref13","article-title":"Learning Models of Network Traffic for Detecting Novel Attacks","author":"mahoney","year":"2002","journal-title":"Tech Report CS-2002-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775102"},{"key":"ref15","article-title":"A view of the EM algorithm that justifies incremental, sparse and print variants","author":"neal","year":"1993","journal-title":"Tech Report"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/584887.584889"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"},{"article-title":"Gigabit intrusion-detection systems","year":"2002","author":"yocom","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1145\/235968.233324","article-title":"BIRCH: An Efficient Data Clustering Method for Very Large Databases","author":"zhang","year":"1996","journal-title":"Proc of ACM SIGMOD"},{"key":"ref4","article-title":"Network Applications of Bloom filters: A Survey","author":"broder","year":"2002","journal-title":"Proc of Allerton Conference"},{"key":"ref3","article-title":"Scaling EM (Expectation-Maximization) Clustering to Large Databases","author":"bradley","year":"1998","journal-title":"Report MSR-TR-98-35"},{"key":"ref6","article-title":"Anomaly detection over noisy data using learned probability distributions","author":"eskin","year":"2000","journal-title":"Proceedings of the Seventeenth International Conference on Machine Learning (ICML'00)"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","author":"dempster","year":"1977","journal-title":"J Royal Statistical Soc"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1999.754967"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0953-0_4","article-title":"A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data","author":"eskin","year":"2002","journal-title":"Applications of Data Mining in Computer Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref1","article-title":"Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES)","author":"anderson","year":"1995","journal-title":"Tech Report SRI-CSL-95-06"},{"key":"ref9","article-title":"Algorithms for Mining Distance-Based Outliers in Large Datasets","author":"knorr","year":"1998","journal-title":"Proc Intl Conf on Very Large Databases"}],"event":{"name":"14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005.","location":"San Diego, CA, USA"},"container-title":["Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10216\/32582\/01523864.pdf?arnumber=1523864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T11:25:57Z","timestamp":1736594757000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icccn.2005.1523864","relation":{},"subject":[]}}