{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:13Z","timestamp":1759092193520,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/isi.2009.5137283","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T11:06:03Z","timestamp":1246446363000},"page":"125-130","source":"Crossref","is-referenced-by-count":3,"title":["A Higher Order Collective Classifier for detecting and classifying network events"],"prefix":"10.1109","author":[{"given":"Vikas","family":"Menon","sequence":"first","affiliation":[]},{"given":"William M.","family":"Pottenger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"485","volume":"uai 2002","author":"taskar","year":"0","journal-title":"Discriminative Probabilistic Models for Relational Data"},{"key":"17","first-page":"97","article-title":"automatic word sense discrimination","volume":"24","author":"schutze","year":"1998","journal-title":"Computational Linguistics"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.59"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10101"},{"year":"0","key":"16"},{"key":"13","article-title":"novelty detection: a review - parts 1 and 2","volume":"83","author":"markou","year":"2003","journal-title":"Signal Processing"},{"year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096542"},{"article-title":"predicting the presence of internet worms using novelty detection","year":"0","author":"marais","key":"12"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2005","author":"witten","key":"21"},{"year":"0","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/267954.267957"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080189"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(00)00032-7"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028887"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2004.11.007"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148254"},{"journal-title":"What is the Sound of One Route Flapping? IPAM","year":"2002","author":"giffin","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117455"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.52"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.3115\/976909.979684"},{"key":"9","article-title":"one class training for masquerade detection","author":"wang","year":"2003","journal-title":"ICDM Workshop on Data Mining for Computer Security (DMSEC)"},{"key":"8","first-page":"593","author":"jensen","year":"2004","journal-title":"Why collective inference improves relational classification"}],"event":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","start":{"date-parts":[[2009,6,8]]},"location":"Richardson, TX, USA","end":{"date-parts":[[2009,6,11]]}},"container-title":["2009 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5089313\/5137253\/05137283.pdf?arnumber=5137283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T00:24:03Z","timestamp":1489796643000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5137283\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isi.2009.5137283","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}