{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:04:33Z","timestamp":1725563073006},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/pccc.2008.4745080","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T16:04:49Z","timestamp":1232121889000},"page":"517-523","source":"Crossref","is-referenced-by-count":3,"title":["Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Sun-il","family":"Kim","sequence":"first","affiliation":[]},{"given":"Nnamdi","family":"Nwanze","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Generalizable patterns in neuroimaging How many principal components","year":"1998","author":"hansen","key":"17"},{"year":"0","key":"18"},{"key":"15","article-title":"anagram: a content anomaly detector resistant to mimicry attack","author":"wang","year":"0","journal-title":"RAID 2006"},{"journal-title":"Non graphical solutions for the cattells scree test","year":"2006","author":"rache","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/508185.508186"},{"journal-title":"Anomalous Payload-based Network Intrusion Detection","year":"2004","author":"wang","key":"14"},{"key":"11","article-title":"an application of principal component analysis to the detection and visualization of computer network attacks","author":"labib","year":"2005","journal-title":"Annals of Telecommunications"},{"journal-title":"Efficient intrusion detection using principal component analysis","year":"0","author":"bouzida","key":"12"},{"key":"3","article-title":"experiences with emerald to date","author":"neumann","year":"1999","journal-title":"RAID"},{"journal-title":"Snort - lightweight intrusion detection for networks","year":"0","author":"roesch","key":"2"},{"journal-title":"CSI COMPUTER CRIME AND SECURITY SURVEY","year":"2007","author":"richardson","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664303"},{"key":"7","article-title":"an approach for detecting self-propagating email using anomaly detection","author":"gupta","year":"0","journal-title":"International Symp on Recent Advances in Intrusion Detection 2003"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/952589.952601"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"key":"4","article-title":"a geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data","author":"eskin","year":"0","journal-title":"Data Mining for Security App Kluwer 2002"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.001"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437798"}],"event":{"name":"2008 IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2008,12,7]]},"location":"Austin, TX, USA","end":{"date-parts":[[2008,12,9]]}},"container-title":["2008 IEEE International Performance, Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4712735\/4745069\/04745080.pdf?arnumber=4745080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:49:31Z","timestamp":1489765771000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4745080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/pccc.2008.4745080","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}