{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:01:10Z","timestamp":1756893670531},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906327","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T10:59:25Z","timestamp":1412074765000},"page":"24-29","source":"Crossref","is-referenced-by-count":3,"title":["Coping with 0-day attacks through Unsupervised Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Pedro","family":"Casas","sequence":"first","affiliation":[]},{"given":"Johan","family":"Mazel","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Owezarski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1352664.1352675"},{"key":"18","article-title":"Traffic data repository at the wide project","author":"cho","year":"2000","journal-title":"USENIX Annual Technical Conference"},{"key":"15","article-title":"Unsupervised anomaly detection in network intrusion detection using clustering","author":"leung","year":"2005","journal-title":"Proc ACSC"},{"key":"16","article-title":"Automated classification of network traffic Anomalies","author":"fernandes","year":"2009","journal-title":"Proc SECURICOM"},{"key":"13","article-title":"Intrusion detection with unlabeled data using Clustering","author":"portnoy","year":"2001","journal-title":"Proc ACM DMSA Workshop"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0953-0_4","article-title":"A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data","author":"eskin","year":"2002","journal-title":"Applications of Data Mining in Computer Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.113"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804318"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.011"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20757-0_4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007731"},{"key":"7","article-title":"Effective value of decision tree with kdd99 Intrusion detection datasets for ids","author":"lee","year":"2008","journal-title":"Proc ICACT"},{"key":"6","article-title":"Using decision trees to improve signature-based intrusion detection","author":"kruegel","year":"2003","journal-title":"Proc RAID"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012428"},{"key":"9","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proc ACM SIGKDD"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906327.pdf?arnumber=6906327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T12:05:39Z","timestamp":1602677139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906327","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}