{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:44:06Z","timestamp":1747248246438,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966369","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:41:30Z","timestamp":1499722890000},"page":"4065-4072","source":"Crossref","is-referenced-by-count":9,"title":["An investigation of the hoeffding adaptive tree for the problem of network intrusion detection"],"prefix":"10.1109","author":[{"given":"Diego Guarnieri","family":"Correa","sequence":"first","affiliation":[]},{"given":"Fabricio","family":"Enembreck","sequence":"additional","affiliation":[]},{"given":"Carlos N.","family":"Silla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Pattern Classification","year":"2001","author":"duda","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557060"},{"key":"ref30","first-page":"299","article-title":"Fast perceptron decision tree learning from evolving data streams","author":"bifet","year":"2010","journal-title":"Proceedings of the 14th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining - Volume Part II ser PAKDD'10"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9179-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pnsc.2008.06.008"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-47534-9","volume":"31","author":"aggarwal","year":"2007","journal-title":"Data Streams Models and Algorithms Advances in Database Systems"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1201\/EBK1439826119","author":"gama","year":"2010","journal-title":"Knowledge Discovery from Data Streams"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/543614.543615"},{"key":"ref17","first-page":"413","article-title":"Data streams: Algorithms and applications","author":"muthukrishnan","year":"2003","journal-title":"Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms Ser SODA '03"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/3CA.2010.5533759"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1083784.1083789"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-012-5320-9"},{"key":"ref4","first-page":"229","article-title":"Snort - lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th USENIX Conference on System Administration Ser LISA '99"},{"key":"ref27","article-title":"Moa: Massive online analysis, a framework for stream classification and clustering","author":"bifet","year":"2010","journal-title":"Discovery Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21236\/ADA375846"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2014.87"},{"journal-title":"Improving Hoeffding trees","year":"2007","author":"kirkby","key":"ref29"},{"journal-title":"OSSEC Host-Based Intrusion Detection Guide","year":"2008","author":"bray","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIME.2010.5477694"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5772\/13951"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246173"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00035"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347107"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"ref24","first-page":"249","author":"bifet","year":"2009","journal-title":"Adaptive Learning from Evolving Data Streams"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"journal-title":"Honeypots Tracking Hackers","year":"2002","author":"spitzner","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2017,5,14]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966369.pdf?arnumber=7966369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T10:26:18Z","timestamp":1569752778000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966369","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}