{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:51:16Z","timestamp":1730224276071,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8254482","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:50:54Z","timestamp":1516056654000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Automation of Network Operations by Cooperation between Anomaly Detections and Operation Logs"],"prefix":"10.1109","author":[{"given":"Naoki","family":"Yoshida","sequence":"first","affiliation":[]},{"given":"Shingo","family":"Ata","sequence":"additional","affiliation":[]},{"given":"Hiroki","family":"Nakayama","sequence":"additional","affiliation":[]},{"given":"Tsunemasa","family":"Hayashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.67"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847986"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367332"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-014-1701-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879202"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1515\/pik-2014-0009"},{"key":"ref17","first-page":"464","article-title":"Hybrid machine learning technique for intrusion detection system","author":"mohamad tahir","year":"2015","journal-title":"Proceedings of the 5th International Conference on Computing and Informatics (ICOCI)"},{"key":"ref18","article-title":"Web application honeypot","volume":"2","author":"pawar","year":"2014","journal-title":"International Journal"},{"key":"ref19","article-title":"Enhancing intrusion detection system performance using firecol protection services based honeypot system","author":"selvaraj","year":"2014","journal-title":"Proc Int Conf Information Technology Computers Communications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INMW.2009.5195942"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553682"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702557"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref8","first-page":"115","article-title":"Monitoring service clouds in the future internet","author":"clayman","year":"2010","journal-title":"Future Internet Assembly"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2541596.2541602"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838412"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2014.6916407"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","start":{"date-parts":[[2017,12,4]]},"location":"Singapore","end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08254482.pdf?arnumber=8254482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:13:17Z","timestamp":1519085597000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8254482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8254482","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}