{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:46:29Z","timestamp":1754163989408,"version":"3.41.2"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/iske47853.2019.9170430","type":"proceedings-article","created":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T17:10:34Z","timestamp":1597770634000},"page":"755-759","source":"Crossref","is-referenced-by-count":5,"title":["Web Log Anomaly Detection Based on Isolated Forest Algorithm"],"prefix":"10.1109","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[{"name":"Xi&#x2019;an University of Posts &#x0026; Telecommunications,School of Computer Science &#x0026; Technology,Xi&#x2019;an,China"}]},{"given":"Lijun","family":"Chen","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an University of Posts &#x0026; Telecommunications,School of Computer Science &#x0026; Technology,Xi&#x2019;an,China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Research on Intrusion Detection Algorithm Based on WEB Log[D]","author":"yang","year":"2018","journal-title":"Beijing University of Posts and Telecommunications"},{"key":"ref11","article-title":"Design and implementation of anomaly detection system based on log feature[D]","author":"kai","year":"2014","journal-title":"Xi&#x2019;an Electronic and Science University"},{"key":"ref12","article-title":"a hybrid web log based intrusion detection model","author":"jing","year":"0","journal-title":"Proceedings of 2016 4th IEEE International Conference on Cloud Computing and Intelligence Systems (IEEE CCIS2016)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2017.8359854"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125846"},{"key":"ref3","first-page":"62","article-title":"Actual Behavior Detection Based on Web Access Log[J]","volume":"41","author":"zhihong","year":"2015","journal-title":"Computer Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref5","article-title":"Isolation Forest[P]. Data Mining, 2008","author":"liu","year":"2008","journal-title":"ICDM 08 Eighth IEEE International Conference on"},{"key":"ref8","article-title":"Application of cluster-based outlier mining in intrusion detection [D]","author":"xiaohui","year":"2015","journal-title":"Chongqing University"},{"key":"ref7","first-page":"2310","article-title":"Detection of abnormal behavior based on user portraits[J]","volume":"50","author":"jiajun","year":"2017","journal-title":"Communication Technology"},{"key":"ref2","first-page":"17","article-title":"Anomaly Detection Technology Based on Log Template[J]","volume":"8","author":"zhiyuan","year":"2018","journal-title":"Journal of Computational Intelligence and Applications"},{"key":"ref1","first-page":"73","article-title":"A Log Anomaly Detection Algorithm Based on Grammar Compression[J]","volume":"37","author":"yun","year":"2014","journal-title":"Chinese Journal of Computers"},{"key":"ref9","article-title":"Research on anomaly detection technology based on WEB access log[D]","author":"lin","year":"2015","journal-title":"Ocean University of China"}],"event":{"name":"2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)","start":{"date-parts":[[2019,11,14]]},"location":"Dalian, China","end":{"date-parts":[[2019,11,16]]}},"container-title":["2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9163188\/9170202\/09170430.pdf?arnumber=9170430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T18:31:21Z","timestamp":1753986681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9170430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iske47853.2019.9170430","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}