{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:06Z","timestamp":1750220886827,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371678","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"69-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Abnormal Network Traffic Detection based on Leaf Node Density Ratio"],"prefix":"10.1145","author":[{"given":"Huajun","family":"Liu","sequence":"first","affiliation":[{"name":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent, Information Processing, Fuzhou, Fujian, China"}]},{"given":"Zhanghui","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent, Information Processing, Fuzhou, Fujian, China"}]},{"given":"Yanhua","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing, Fuzhou, Fujian, China"}]},{"given":"Xiaoling","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China, Fujian Provincial Key Laboratory of Network Computing and Intelligent, Information Processing, Fuzhou, Fujian, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Hawkins D. M. 1980. Identification of Outliers. Identification of outliers.  Hawkins D. M. 1980. Identification of Outliers. Identification of outliers.","DOI":"10.1007\/978-94-015-3994-4"},{"issue":"24","key":"e_1_3_2_1_2_1","first-page":"123","article-title":"Anomaly detection model of network traffic based on statistics","volume":"31","author":"Liang S.","year":"2005","unstructured":"Liang , S. , Xiao , Z. , & Yanmei , X. U. 2005 . Anomaly detection model of network traffic based on statistics . Computer Engineering , 31 ( 24 ), 123 -- 125 . Liang, S., Xiao, Z., & Yanmei, X. U. 2005. Anomaly detection model of network traffic based on statistics. Computer Engineering, 31(24), 123--125.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.14"},{"key":"e_1_3_2_1_4_1","volume-title":"Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining. International Conference on Innovative Mobile & Internet Services in Ubiquitous Computing.","author":"Cui B.","year":"2015","unstructured":"Cui , B. , He , S. , & Jin , H. 2015 . Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining. International Conference on Innovative Mobile & Internet Services in Ubiquitous Computing. Cui, B., He, S., & Jin, H. 2015. Multi-layer Anomaly Detection for Internet Traffic Based on Data Mining. International Conference on Innovative Mobile & Internet Services in Ubiquitous Computing."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"e_1_3_2_1_6_1","volume-title":"Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM '08)","author":"Fei Tony Liu","year":"2008","unstructured":"Fei Tony Liu , Kai Ming Ting, and Zhi-Hua Zhou . 2008 . Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM '08) . IEEE Computer Society, Washington, DC, USA, 413--422. DOI=http:\/\/dx.doi.org\/10.1109\/ICDM. 2008.17 10.1109\/ICDM.2008.17 Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM '08). IEEE Computer Society, Washington, DC, USA, 413--422. DOI=http:\/\/dx.doi.org\/10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASMC.2017.7969205"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2009 Ninth IEEE International Conference on Data Mining (ICDM '09)","author":"Xiao Yu","year":"2009","unstructured":"Xiao Yu , Lu An Tang, and Jiawei Han . 2009 . Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection . In Proceedings of the 2009 Ninth IEEE International Conference on Data Mining (ICDM '09) . IEEE Computer Society, Washington, DC, USA, 617--626. DOI= https:\/\/doi.org\/10.1109\/ICDM. 2009.44 10.1109\/ICDM.2009.44 Xiao Yu, Lu An Tang, and Jiawei Han. 2009. Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection. In Proceedings of the 2009 Ninth IEEE International Conference on Data Mining (ICDM '09). IEEE Computer Society, Washington, DC, USA, 617--626. DOI= https:\/\/doi.org\/10.1109\/ICDM.2009.44"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-CN-3020.00044"},{"key":"e_1_3_2_1_10_1","unstructured":"Hariri S. Kind M. C. & Brunner R. J. 2018. Extended Isolation Forest. arXiv preprint arXiv:1811.02141.  Hariri S. Kind M. C. & Brunner R. J. 2018. Extended Isolation Forest. arXiv preprint arXiv:1811.02141."}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":10,"alternative-id":["10.1145\/3371676.3371678","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371678","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}