{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:27:39Z","timestamp":1762032459479},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/icdm.2003.1250987","type":"proceedings-article","created":{"date-parts":[[2004,4,23]],"date-time":"2004-04-23T18:38:15Z","timestamp":1082745495000},"page":"601-604","source":"Crossref","is-referenced-by-count":107,"title":["Learning rules for anomaly detection of hostile network traffic"],"prefix":"10.1109","author":[{"given":"M.V.","family":"Mahoney","sequence":"first","affiliation":[]},{"given":"P.K.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166255"},{"journal-title":"SPADE Silicon Defense","year":"2000","author":"hoagland","key":"ref3"},{"key":"ref10","article-title":"Snort - Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"Proc USENIX LISA"},{"journal-title":"Source code for PHAD ALAD LERAD NETAD SAD EVAL 3 EVAL 4 EVAL and AFIL PL","year":"0","author":"mahoney","key":"ref6"},{"key":"ref11","first-page":"80","article-title":"Adaptive, Model-based Monitoring for Cyber Attack Detection","author":"valdes","year":"2000","journal-title":"Proc RAID"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"ref8","article-title":"Bro: A System for Detecting Network Intruders in Real-Time","author":"paxson","year":"1998","journal-title":"7 Th USENIX Security Symp"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604268"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"ref1","article-title":"Fast Algorithms for Mining Association Rules","author":"agrawal","year":"1994","journal-title":"Proc Int Conf On Very Large Data Bases"}],"event":{"name":"Third IEEE International Conference on Data Mining","start":{"date-parts":[[2003,11,22]]},"location":"Melbourne, FL, USA","end":{"date-parts":[[2003,11,22]]}},"container-title":["Third IEEE International Conference on Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8854\/27998\/01250987.pdf?arnumber=1250987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T04:53:21Z","timestamp":1585630401000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1250987\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icdm.2003.1250987","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}