{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:50:15Z","timestamp":1777614615327,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,22]],"date-time":"2004-08-22T00:00:00Z","timestamp":1093132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,22]]},"DOI":"10.1145\/1014052.1014102","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T17:39:48Z","timestamp":1097170788000},"page":"440-449","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":123,"title":["Eigenspace-based anomaly detection in computer systems"],"prefix":"10.1145","author":[{"given":"Tsuyoshi","family":"ID\u00c9","sequence":"first","affiliation":[{"name":"Tokyo Research Laboratory, IBM Research"}]},{"given":"Hisashi","family":"KASHIMA","sequence":"additional","affiliation":[{"name":"Tokyo Research Laboratory, IBM Research"}]}],"member":"320","published-online":{"date-parts":[[2004,8,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956757"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"e_1_3_2_1_3_1","series-title":"Classics in applied mathematics","doi-asserted-by":"crossref","DOI":"10.1137\/1.9781611971262","volume-title":"Nonnegative Matrices in the Mathematical Sciences","author":"Berman A.","year":"1994","unstructured":"A. Berman and R. J. Plemmons . Nonnegative Matrices in the Mathematical Sciences , volume 9 of Classics in applied mathematics . SIAM , 1994 . A. Berman and R. J. Plemmons. Nonnegative Matrices in the Mathematical Sciences, volume 9 of Classics in applied mathematics. SIAM, 1994."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502550"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502551"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.421.0005"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39671-0_24"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204189"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956816"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952101"},{"key":"e_1_3_2_1_11_1","unstructured":"IBM. Trade3; http:\/\/www-306.ibm.com\/software\/webservers\/appserv\/benchmark3.html.  IBM. Trade3; http:\/\/www-306.ibm.com\/software\/webservers\/appserv\/benchmark3.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952149"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021726221443"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/844380.844733"},{"key":"e_1_3_2_1_15_1","first-page":"903","volume-title":"Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence","author":"Ng A. Y.","year":"2001","unstructured":"A. Y. Ng , A. X. Zheng , and M. I. Jordan . Link analysis, eigenvectors and stability . In Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence , pages 903 -- 910 , 2001 . A. Y. Ng, A. X. Zheng, and M. I. Jordan. Link analysis, eigenvectors and stability. In Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, pages 903--910, 2001."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956831"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1997.0637"},{"key":"e_1_3_2_1_18_1","volume-title":"Linear Algebra and its Applications","author":"Strang G.","year":"1976","unstructured":"G. Strang . Linear Algebra and its Applications . Academic Press , 1976 . G. Strang. Linear Algebra and its Applications. Academic Press, 1976."},{"key":"e_1_3_2_1_19_1","unstructured":"The Open Group. Application response measurement --- ARM; http:\/\/www.opengroup.org\/tech\/management\/arm\/.  The Open Group. Application response measurement --- ARM; http:\/\/www.opengroup.org\/tech\/management\/arm\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"e_1_3_2_1_21_1","first-page":"1530","volume-title":"Proceedings IEEE INFOCOM 2002","author":"Wang H.","year":"2002","unstructured":"H. Wang , D. Zhang , and K. G. Shin . Detecting SYN flooding attacks . In Proceedings IEEE INFOCOM 2002 , pages 1530 -- 1539 , 2002 . H. Wang, D. Zhang, and K. G.Shin. Detecting SYN flooding attacks. In Proceedings IEEE INFOCOM 2002, pages 1530 --1539, 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/959242.959249"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775148"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347160"}],"event":{"name":"KDD04: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Seattle WA USA","acronym":"KDD04","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1014052.1014102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:30Z","timestamp":1750264290000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1014052.1014102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,8,22]]},"references-count":24,"alternative-id":["10.1145\/1014052.1014102","10.1145\/1014052"],"URL":"https:\/\/doi.org\/10.1145\/1014052.1014102","relation":{},"subject":[],"published":{"date-parts":[[2004,8,22]]},"assertion":[{"value":"2004-08-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}