{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:24:35Z","timestamp":1729664675029,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/lcn.2012.6423588","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T16:27:47Z","timestamp":1360340867000},"page":"128-131","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion detection in computer networks using Optimum-Path Forest clustering"],"prefix":"10.1109","author":[{"given":"Kelton","family":"Costa","sequence":"first","affiliation":[]},{"given":"Clayton","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Nakamura","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Papa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539307002568"},{"key":"15","first-page":"1","article-title":"A scalable clustering technique for intrusion signature recognition","author":"ye","year":"2001","journal-title":"Proceedings of 2nd IEEE SMC Information Assurance Workshop"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967988"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/ima.20191"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"journal-title":"LibOPF A Library for the Design of Optimum-Path Forest Classifiers","year":"2009","author":"papa","key":"11"},{"key":"12","first-page":"5","article-title":"Intrusion detection with unlabeled data using clustering","author":"portnoy","year":"2001","journal-title":"Proceedings of ACM CSS Workshop on Data Mining Applied to Security"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/34.400568"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"journal-title":"LIBSVM A library for support vector machines","year":"2001","author":"chang","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/ima.20188"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2003.1226084"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738646"},{"key":"5","first-page":"255","article-title":"Anomaly detection over noisy data using learned probability distributions","author":"eskin","year":"2000","journal-title":"Proceedings of the International Conference on Machine Learning"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1177159"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DNSR.2004.1344728"},{"key":"8","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/11427995_51","article-title":"Learning classifiers for misuse detection using a bag of system calls representation","volume":"3495","author":"kang","year":"2005","journal-title":"Proceedings of IEEE International Conference on Intelligence and Security Informatics"}],"event":{"name":"2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)","start":{"date-parts":[[2012,10,22]]},"location":"Clearwater Beach, FL, USA","end":{"date-parts":[[2012,10,25]]}},"container-title":["37th Annual IEEE Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6413535\/6423567\/06423588.pdf?arnumber=6423588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:13:05Z","timestamp":1498014785000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6423588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/lcn.2012.6423588","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}