{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:52:13Z","timestamp":1760597533508,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2381896.2381905","type":"proceedings-article","created":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T13:41:01Z","timestamp":1350654061000},"page":"49-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Nonparametric semi-supervised learning for network intrusion detection"],"prefix":"10.1145","author":[{"given":"Christopher T.","family":"Symons","sequence":"first","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]},{"given":"Justin M.","family":"Beaver","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, Oak Ridge, TN, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150459"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1046920.1194905"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/357830.357849"},{"key":"e_1_3_2_1_4_1","volume-title":"New Theoretical Frameworks for Machine Learning. Phd thesis","author":"Balcan M.-F.","year":"2008","unstructured":"M.-F. Balcan . New Theoretical Frameworks for Machine Learning. Phd thesis , 2008 . M.-F. Balcan. New Theoretical Frameworks for Machine Learning. Phd thesis, 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"An Augmented PAC Model for Semi-Supervised Learning","author":"Balcan M.-F.","year":"2006","unstructured":"M.-F. Balcan and A. Blum . An Augmented PAC Model for Semi-Supervised Learning . MIT Press , Cambridge, MA , 2006 . M.-F. Balcan and A. Blum. An Augmented PAC Model for Semi-Supervised Learning. MIT Press, Cambridge, MA, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976603321780317"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000033120.25363.1e"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1248547.1248632"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1841234"},{"key":"e_1_3_2_1_11_1","first-page":"2603","volume-title":"Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on","author":"Chen C.","year":"2008","unstructured":"C. Chen , Y. Gong , and Y. Tian . Semi-supervised learning methods for network intrusion detection. In Systems , Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on , pages 2603 -- 2608 , 2008 . C. Chen, Y. Gong, and Y. Tian. Semi-supervised learning methods for network intrusion detection. In Systems, Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on, pages 2603--2608, 2008."},{"key":"e_1_3_2_1_12_1","volume-title":"Spectral Graph Theory","author":"Chung F. R. K.","year":"1997","unstructured":"F. R. K. Chung . Spectral Graph Theory . American Mathematical Society , Providence, RI , 1997 . F. R. K. Chung. Spectral Graph Theory. American Mathematical Society, Providence, RI, 1997."},{"key":"e_1_3_2_1_13_1","volume-title":"Minorthird: Methods for identifying names and ontological relations in text using heuristics for inducing regularities from data","author":"Cohen W. W.","year":"2004","unstructured":"W. W. Cohen . Minorthird: Methods for identifying names and ontological relations in text using heuristics for inducing regularities from data , 2004 . W. W. Cohen. Minorthird: Methods for identifying names and ontological relations in text using heuristics for inducing regularities from data, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2018783"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3104482.3104565"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.911294"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.70"},{"key":"e_1_3_2_1_18_1","volume-title":"Semi-Supervised Model for Intrusion Detection","author":"Lane T.","year":"2006","unstructured":"T. Lane . A Decision-Theoretic , Semi-Supervised Model for Intrusion Detection . Springer London , 2006 . T. Lane. A Decision-Theoretic, Semi-Supervised Model for Intrusion Detection. Springer London, 2006."},{"key":"e_1_3_2_1_19_1","volume-title":"Nonparametric bayesian kernel models. Technical report","author":"Liang F.","year":"2007","unstructured":"F. Liang , K. Mao , M. Liao , S. Mukherjee , and M. West . Nonparametric bayesian kernel models. Technical report , Duke University , 2007 . F. Liang, K. Mao, M. Liao, S. Mukherjee, and M. West. Nonparametric bayesian kernel models. Technical report, Duke University, 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1214\/088342307000000032"},{"key":"e_1_3_2_1_21_1","volume-title":"the 2000 DARPA Information Survivability Conference and Exposition","author":"Lippmann R. P.","year":"2000","unstructured":"R. P. Lippmann , D. J. Fried , I. Graf , J. W. Haines , K. R. Kendall , D. McClung , D. Weber , S. E. Webster , D. Wyschogrod , R. K. Cunningham , and M. A. Zissman . Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation . In the 2000 DARPA Information Survivability Conference and Exposition , 2000 . R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman. Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In the 2000 DARPA Information Survivability Conference and Exposition, 2000."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529735"},{"key":"e_1_3_2_1_23_1","volume-title":"Bayesian Nonparametric Models","author":"Orbanz P.","year":"2010","unstructured":"P. Orbanz and Y. W. Teh . Bayesian Nonparametric Models . Springer , 2010 . P. Orbanz and Y. W. Teh. Bayesian Nonparametric Models. Springer, 2010."},{"key":"e_1_3_2_1_24_1","volume-title":"the 10th Workshop on Artificial Intelligence and Statistics (AISTATS)","author":"Ouimet M.","year":"2005","unstructured":"M. Ouimet and Y. Bengio . Greedy spectral embedding . In the 10th Workshop on Artificial Intelligence and Statistics (AISTATS) , 2005 . M. Ouimet and Y. Bengio. Greedy spectral embedding. In the 10th Workshop on Artificial Intelligence and Statistics (AISTATS), 2005."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1314498.1314558"},{"key":"e_1_3_2_1_26_1","volume-title":"Morgan Kaufmann","author":"Pyle D.","year":"1999","unstructured":"D. Pyle . Data Preparation for Data Mining, Volume 1 . Morgan Kaufmann , 1999 . D. Pyle. Data Preparation for Data Mining, Volume 1. Morgan Kaufmann, 1999."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622503.1622504"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the 5th ACM workshop on Security and artificial intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381896.2381905","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381896.2381905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381896.2381905"}},"subtitle":["combining performance improvements with realistic in-situ training"],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":30,"alternative-id":["10.1145\/2381896.2381905","10.1145\/2381896"],"URL":"https:\/\/doi.org\/10.1145\/2381896.2381905","relation":{},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}