{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:09:02Z","timestamp":1742382542608},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/isi.2008.4565071","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T16:05:44Z","timestamp":1216310744000},"page":"251-253","source":"Crossref","is-referenced-by-count":4,"title":["Anomaly detection in high-dimensional network data streams: A case study"],"prefix":"10.1109","author":[{"given":"Ji","family":"Zhang","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada"}]},{"given":"Qigang","family":"Gao","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Dalhousie University, Halifax, Nova Scotia, Canada"}]},{"given":"Hai","family":"Wang","sequence":"additional","affiliation":[{"name":"Sobey School of Business, Saint Mary's University, Halifax, Nova Scotia, Canada"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2050737"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0020-z"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.6"},{"key":"5","first-page":"211","article-title":"finding intensional knowledge of distance-based outliers","author":"knorr","year":"1999","journal-title":"VLDB"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0953-0_4","article-title":"a geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data","author":"eskin","year":"2002","journal-title":"Data Mining for Security Applications"},{"key":"9","first-page":"829","article-title":"example-based robust outlier detection in high dimensional datasets","author":"zhu","year":"2005","journal-title":"ICDM"},{"key":"8","first-page":"190","article-title":"a clustering approach to wireless network intrusion detection","author":"zhong","year":"2005","journal-title":"ICTAI"}],"event":{"name":"2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)","start":{"date-parts":[[2008,6,17]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2008,6,20]]}},"container-title":["2008 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4557995\/4565003\/04565071.pdf?arnumber=4565071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T16:11:49Z","timestamp":1617984709000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4565071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isi.2008.4565071","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}