{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:43:04Z","timestamp":1730274184928,"version":"3.28.0"},"reference-count":4,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/isi.2017.8004918","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T16:42:42Z","timestamp":1502383362000},"page":"205-205","source":"Crossref","is-referenced-by-count":5,"title":["Attack pattern mining algorithm based on security log"],"prefix":"10.1109","author":[{"given":"Keyi","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yang","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianyi","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ru","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xi","family":"Duan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2007.20"},{"key":"ref3","first-page":"120","author":"lee","year":"1999","journal-title":"A Data Mining Framewrk for Adaptive Intrusion Detection"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref1","first-page":"814","article-title":"Generalized Study of FCM Clustering Algorithm Based on Improved Fuzzy Partition [J]","volume":"5","author":"lin","year":"2009","journal-title":"Journal of Computer research and development"}],"event":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2017,7,22]]},"location":"Beijing, China","end":{"date-parts":[[2017,7,24]]}},"container-title":["2017 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999198\/8004858\/08004918.pdf?arnumber=8004918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T19:48:43Z","timestamp":1503517723000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8004918\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":4,"URL":"https:\/\/doi.org\/10.1109\/isi.2017.8004918","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}