{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:25:29Z","timestamp":1753356329178},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_30","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"415-426","source":"Crossref","is-referenced-by-count":6,"title":["Anomaly Intrusion Detection Based on Clustering a Data Stream"],"prefix":"10.1007","author":[{"given":"Sang-Hyun","family":"Oh","sequence":"first","affiliation":[]},{"given":"Jin-Suk","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Yung-Cheol","family":"Byun","sequence":"additional","affiliation":[]},{"given":"Taikyeong T.","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Won-Suk","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"30_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B. Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, T.L., Kevitt, K.N.: Network Intrusion Detection. IEEE Network\u00a08(3), 26\u201341 (1994)","journal-title":"IEEE Network"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Heady, R., Luger, G., Maccabe, A., Servilla, M.: The Architecture of a Network Level Intrusion Detection System, Technical Report, Computer Science Department, University of New Mexico (August 1990)","DOI":"10.2172\/425295"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: Proc. of the 1991 IEEE Symposium on Research in Security and Privacy (May 1991)","DOI":"10.1109\/RISP.1991.130799"},{"key":"30_CR4","unstructured":"Javitz, H.S., Valdes, A.: The NIDES Statistical Component Description and Justification, Annual report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025 (March 1994)"},{"key":"30_CR5","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: 20th NISSC (October 1997)"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/CAIA.1990.89167","volume-title":"Proceedings of the Sixth Conference on Artificial Intelligence Applications","author":"H.S. Teng","year":"1990","unstructured":"Teng, H.S., Chen, K., Lu, S.C.: Security Audit Trail Analysis Using Inductively Generated Predictive Rules. In: Proceedings of the Sixth Conference on Artificial Intelligence Applications, Piscataway, New Jersey, March 1990, pp. 24\u201329. IEEE, Los Alamitos (1990)"},{"key":"30_CR7","unstructured":"Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D., Chan, P.K.: JAM: Java agents for Meta-Learning over Distributed Databases. In: Proc. KDD 1997 and AAAI 1997 Work. on AI Methods in Fraud and Risk Management (1997)"},{"issue":"3","key":"30_CR8","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TKDE.2003.1198387","volume":"15","author":"S. Guha","year":"2003","unstructured":"Guha, S., Meyerson, A., Mishra, N., Motwani, R., O\u2019Callaghan, L.: Clustering data streams: Theory and practice. IEEE Trans. Knowl. Data Eng.\u00a015(3), 515\u2013528 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"30_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/974121.974127","volume":"33","author":"N.H. Park","year":"2004","unstructured":"Park, N.H., Lee, W.S.: Statistical grid-based clustering over data streams. SIGMOD Record\u00a033(1), 32\u201337 (2004)","journal-title":"SIGMOD Record"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Chang, J.H., Lee, W.S.: estWin: adaptively monitoring the recent change of frequent itemsets over online data streams. In: CIKM 2003, pp. 536\u2013539 (2003)","DOI":"10.1145\/956863.956967"},{"key":"30_CR11","unstructured":"MacQueen, J.: Some Methods for Classification and Analysis of Multivariate Observations. In: Proc. 5th Berkeley Symp., pp. 281\u2013297 (1967)"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ramakrishnan, R., Livny, M.: Birch: An Efficient data clustering method for very large databases. In: Proceedings for the ACM SIGMOD Conference on Management of Data, Montreal, Canada (June 1996)","DOI":"10.1145\/233269.233324"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Guha, S., Rastogi, R., Shim, K.: CURE: An Efficient Clustering Algorithm for Large Databases. In: ACM SIGMOD International Conference on Management of Data, Seattle, Washington (1998)","DOI":"10.1145\/276304.276312"},{"key":"30_CR14","volume-title":"Proc. 2nd int. Conf. on Knowledge Discovery and Data Mining (KDD 1996)","author":"M. Ester","year":"1996","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In: Proc. 2nd int. Conf. on Knowledge Discovery and Data Mining (KDD 1996), Portland, Oregon. AAAI Press, Menlo Park (1996)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Gehrke, J., Gunopulos, D., Raghavan, P.: Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications. In: Proc. of the ACM SIGMOD Int\u2019l Conference on Management of Data, Seattle, Washington (June 1998)","DOI":"10.1145\/276304.276314"},{"key":"30_CR16","doi-asserted-by":"crossref","unstructured":"Jeong, T., Ambler, A.: Power efficiency system for flight application (PESFA) mission: Low power dissipation in digital circuit design for flight application\/space communications. IEEE Tran. on Aerospace and Electronics Systems\u00a042 (2006)","DOI":"10.1109\/TAES.2006.314592"},{"key":"30_CR17","unstructured":"http:\/\/www.ll.mit.edu\/IST\/ideval\/index.html"},{"key":"30_CR18","unstructured":"Sun Microsystems. SunShield Basic Security Module Guid"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:19:45Z","timestamp":1605644385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11836810_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}