{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:40:56Z","timestamp":1725500456060},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/pccc.2010.5682339","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T14:08:43Z","timestamp":1294409323000},"page":"17-24","source":"Crossref","is-referenced-by-count":0,"title":["Towards dynamic self-tuning for intrusion detection systems"],"prefix":"10.1109","author":[{"given":"Sun-il","family":"Kim","sequence":"first","affiliation":[]},{"given":"Nnamdi","family":"Nwanze","sequence":"additional","affiliation":[]},{"given":"Jasen","family":"Kintner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"key":"ref11","article-title":"Protecting a moving target: Addressing web application concept drift","author":"maggi","year":"2009","journal-title":"RAID"},{"key":"ref12","article-title":"Anagram: A content anomaly detector resistant to mimicry attack","author":"wang","year":"2006","journal-title":"RAID"},{"key":"ref13","article-title":"Anomalous payload-based network intrusion detection","author":"wang","year":"2004","journal-title":"Columbia University Technical Report"},{"key":"ref14","first-page":"259","article-title":"Approaches to online learning and concept drift for user identification in computer security","author":"lane","year":"0","journal-title":"In KDD"},{"key":"ref15","article-title":"Meta-learning, model selection, and example selection in machine learning domains with concept drift","author":"klinkenberg","year":"2005","journal-title":"FGML-LWA)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2008.4664303"},{"key":"ref3","article-title":"Noise-resistant network intrusion detection","author":"kim","year":"2008","journal-title":"Proceedings of IEEE IPCCC"},{"key":"ref6","article-title":"An approach for detecting self-propagating email using anomaly detection","author":"gupta","year":"2003","journal-title":"RAID"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/952589.952601"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437798"},{"key":"ref2","article-title":"Experiences with emerald to date","author":"neumann","year":"1999","journal-title":"RAID"},{"key":"ref1","article-title":"Insertion, evasion, and denial of service: Eluding network intrusion detection","author":"ptacek","year":"1998","journal-title":"Netw Secur"},{"key":"ref9","article-title":"A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data","author":"eskin","year":"2002","journal-title":"Data Mining for Security App"}],"event":{"name":"2010 29th IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2010,12,9]]},"location":"Albuquerque, NM, USA","end":{"date-parts":[[2010,12,11]]}},"container-title":["International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5678852\/5682287\/05682339.pdf?arnumber=5682339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T05:24:42Z","timestamp":1490073882000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5682339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/pccc.2010.5682339","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}