{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T02:37:11Z","timestamp":1648953431197},"reference-count":23,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602155","61370221","U1404611"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Networks"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1049\/iet-net.2017.0127","type":"journal-article","created":{"date-parts":[[2017,12,9]],"date-time":"2017-12-09T02:24:10Z","timestamp":1512786250000},"page":"85-90","source":"Crossref","is-referenced-by-count":3,"title":["Method for detecting abnormal behaviour of users based on selective clustering ensemble"],"prefix":"10.1049","volume":"7","author":[{"given":"Juan","family":"Du","sequence":"first","affiliation":[{"name":"College of Information Engineering, Henan University of Science and Technology, Henan ShengPeople's Republic of China"}]},{"given":"Ping","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Henan University of Science and Technology, Henan ShengPeople's Republic of China"}]},{"given":"Junlong","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Henan University of Science and Technology, Henan ShengPeople's Republic of China"}]},{"given":"Ruijuan","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Henan University of Science and Technology, Henan ShengPeople's Republic of China"}]},{"given":"Qingtao","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Henan University of Science and Technology, Henan ShengPeople's Republic of China"}]},{"given":"Mingchuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Henan University of Science and Technology, Henan ShengPeople's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2018,3]]},"reference":[{"issue":"11","key":"e_1_2_8_2_2","first-page":"25","article-title":"Clustering ensemble algorithm based on new members selection method","volume":"33","author":"Feng Z.H.","year":"2016","journal-title":"Microelectron. Comput."},{"issue":"7","key":"e_1_2_8_3_2","first-page":"106","article-title":"Research on clustering ensemble algorithms [J]","volume":"20","author":"Qin F.","year":"2010","journal-title":"Comput. Technol. Dev."},{"issue":"15","key":"e_1_2_8_4_2","first-page":"129","article-title":"Title text clustering method based on clustering ensemble","volume":"51","author":"Yang W.","year":"2015","journal-title":"Comput. Eng. Applic."},{"issue":"6","key":"e_1_2_8_5_2","first-page":"772","article-title":"Clustering ensembles based classification method for lmbalanced data sets","volume":"23","author":"Chen S.","year":"2010","journal-title":"Pattern Recognit. Artif. Intell."},{"issue":"19","key":"e_1_2_8_6_2","first-page":"157","article-title":"Clustering ensemble algorithm based on adaptive nearest neighbors","volume":"48","author":"Huang S.","year":"2012","journal-title":"Comput. Eng. Applic."},{"issue":"2","key":"e_1_2_8_7_2","first-page":"178","article-title":"Mail social network community partitioning method based on clustering ensemble","volume":"39","author":"Zhang Z.J.","year":"2017","journal-title":"J. Yunnan Univ. (Nat. Sci. Ed.)"},{"key":"e_1_2_8_8_2","first-page":"1","article-title":"A feature selection and classification algorithm based on randomized extraction of model populations","volume":"99","author":"Brankovic A.","year":"2017","journal-title":"IEEE Trans. Cybern."},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2566621"},{"key":"e_1_2_8_10_2","doi-asserted-by":"crossref","unstructured":"Li H. Wu Q.: \u2018Research of clustering algorithm based on information entropy and frequency sensitive discrepancy metric in anomaly detection\u2019.Int. Conf. Information Science and Cloud Computing Companion 2013 pp.799\u2013805","DOI":"10.1109\/ISCC-C.2013.108"},{"key":"e_1_2_8_11_2","doi-asserted-by":"crossref","unstructured":"Hao X. Meng B. Gu K.: \u2018Detecting DDoS attack based on PSO clustering algorithm\u2019.Int. Conf. Materials Engineering Manufacturing Technology and Control 2016","DOI":"10.2991\/icmemtc-16.2016.133"},{"issue":"10","key":"e_1_2_8_12_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2015\/491910","article-title":"LKM: a LDA\u2010based K\u2010means clustering algorithm for data analysis of intrusion detection in mobile sensor networks","volume":"11","author":"Zhang Y.","year":"2015","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"e_1_2_8_13_2","doi-asserted-by":"crossref","unstructured":"Zhang L.: \u2018The algorithm design of anti\u2010attack performance testing software in large network\u2019.Int. Conf. Automation Mechanical Control and Computational Engineering 2015","DOI":"10.2991\/amcce-15.2015.208"},{"key":"e_1_2_8_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2425803"},{"key":"e_1_2_8_15_2","doi-asserted-by":"crossref","unstructured":"Yeh C.W. Yeh W.T. Hung S.H.et al: \u2018Flattened data in convolutional neural networks: using malware detection as case study [C]\u2019.Int. Conf. Research in Adaptive and Convergent Systems 2016 pp.130\u2013135","DOI":"10.1145\/2987386.2987406"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2646641"},{"key":"e_1_2_8_17_2","doi-asserted-by":"crossref","unstructured":"Liu Q. Bae J. Watson B.et al: \u2018Modeling and sensing risky user behavior on mobile devices\u2019.Symp. Bootcamp on the Science of Security 2014 p.33","DOI":"10.1145\/2600176.2600209"},{"issue":"10","key":"e_1_2_8_18_2","first-page":"2308","article-title":"A cloud user behavior authentication model based on multi \u2013 partite graphs","volume":"51","author":"Junfeng T.","year":"2014","journal-title":"J. Comput. Res. Dev."},{"key":"e_1_2_8_19_2","doi-asserted-by":"crossref","unstructured":"Iglesias J.A. Ledezma A. Sanchis A.: \u2018Evolving systems for computer user behavior classification\u2019.Evolving and Adaptive Intelligent Systems 2013 vol. 7979 pp.78\u201383","DOI":"10.1109\/EAIS.2013.6604108"},{"key":"e_1_2_8_20_2","doi-asserted-by":"crossref","unstructured":"Li Y. Zhang T. Ma Y.Y.et al: \u2018Anomaly detection of user behavior for database security audit based on OCSVM\u2019.2016 3rd Int. Conf. Information Science and Control Engineering (ICISCE) 2016 pp.214\u2013219","DOI":"10.1109\/ICISCE.2016.55"},{"issue":"10","key":"e_1_2_8_21_2","first-page":"2614","article-title":"Multi\u2010Granularity and time\u2010varying fractal dimension on data stream","volume":"26","author":"Ni Z.W.","year":"2015","journal-title":"Ruan Jian Xue Bao\/J. Softw."},{"issue":"5","key":"e_1_2_8_22_2","first-page":"88","article-title":"Image fusion algorithm based on fractal dimension and multi\u2010wavelet transform domain","author":"Shen R.","year":"2014","journal-title":"J. Southwest China Normal Univ. (Nat. Sci. Ed.)"},{"issue":"12","key":"e_1_2_8_23_2","first-page":"1169","article-title":"Attribute selection method based on improved discrete glow worm swarm optimization and fractal dimension","volume":"26","author":"Ni Z.W.","year":"2013","journal-title":"Pattern Recogn. Artif. Intell."},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1360\/jos180905"}],"container-title":["IET Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-net.2017.0127","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-net.2017.0127","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-net.2017.0127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T19:30:15Z","timestamp":1631129415000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-net.2017.0127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["10.1049\/iet-net.2017.0127"],"URL":"https:\/\/doi.org\/10.1049\/iet-net.2017.0127","archive":["Portico"],"relation":{},"ISSN":["2047-4954","2047-4962"],"issn-type":[{"value":"2047-4954","type":"print"},{"value":"2047-4962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}