{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:58:56Z","timestamp":1730329136560,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,3,14]]},"DOI":"10.1145\/967900.967988","type":"proceedings-article","created":{"date-parts":[[2004,7,20]],"date-time":"2004-07-20T15:55:38Z","timestamp":1090338938000},"page":"412-419","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":143,"title":["Unsupervised learning techniques for an intrusion detection system"],"prefix":"10.1145","author":[{"given":"Stefano","family":"Zanero","sequence":"first","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]},{"given":"Sergio M.","family":"Savaresi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]}],"member":"320","published-online":{"date-parts":[[2004,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ft","author":"Anderson J. P.","year":"1980","unstructured":"J. P. Anderson . Computer security threat monitoring and surveillance. Technical report, J. P. Anderson Co ., Ft . Washington, Pennsylvania , Apr 1980 . J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, J. P. Anderson Co., Ft. Washington, Pennsylvania, Apr 1980."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"e_1_3_2_1_3_1","volume-title":"Stockholm","author":"Boley D.","year":"1999","unstructured":"D. Boley , V. Borst , and M. Gini . An unsupervised clustering tool for unstructured data. In IJCAI 99 Int'l Joint Conf. on Artificial Intelligence , Stockholm , Aug 1999 . D. Boley, V. Borst, and M. Gini. An unsupervised clustering tool for unstructured data. In IJCAI 99 Int'l Joint Conf. on Artificial Intelligence, Stockholm, Aug 1999."},{"key":"e_1_3_2_1_4_1","volume-title":"Monographs on Statistics and Applied Probability","author":"Cox T. F.","year":"1995","unstructured":"T. F. Cox and M. A. A. Cox . Multidimensional Scaling . Monographs on Statistics and Applied Probability . Chapman & Hall , 1995 . T. F. Cox and M. A. A. Cox. Multidimensional Scaling. Monographs on Statistics and Applied Probability. Chapman & Hall, 1995."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the 17th Nat'l Computer Security Conf.","author":"Frank J.","year":"1994","unstructured":"J. Frank . Artificial intelligence and intrusion detection: Current and future directions . In Proc. of the 17th Nat'l Computer Security Conf. , Baltimore, MD , 1994 . J. Frank. Artificial intelligence and intrusion detection: Current and future directions. In Proc. of the 17th Nat'l Computer Security Conf., Baltimore, MD, 1994."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647593.728890"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944968"},{"key":"e_1_3_2_1_9_1","volume-title":"Morgan-Kauffman","author":"Han J.","year":"2000","unstructured":"J. Han and M. Kamber . Data Mining: concepts and techniques . Morgan-Kauffman , 2000 . J. Han and M. Kamber. Data Mining: concepts and techniques. Morgan-Kauffman, 2000."},{"key":"e_1_3_2_1_10_1","volume-title":"Clustering Algorithms","author":"Hartigan J. A.","year":"1975","unstructured":"J. A. Hartigan . Clustering Algorithms . Wiley , 1975 . J. A. Hartigan. Clustering Algorithms. Wiley, 1975."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8"},{"key":"e_1_3_2_1_14_1","volume-title":"Master's thesis","author":"Kendall K.","year":"1998","unstructured":"K. Kendall . A database of computer attacks for the evaluation of intrusion detection systems. Master's thesis , Massachussets Institute of Technology , 1998 . K. Kendall. A database of computer attacks for the evaluation of intrusion detection systems. Master's thesis, Massachussets Institute of Technology, 1998."},{"key":"e_1_3_2_1_15_1","volume-title":"3 edition","author":"Kohonen T.","year":"2001","unstructured":"T. Kohonen . Self-Organizing Maps . Springer-Verlag, Berling , 3 edition , 2001 . T. Kohonen. Self-Organizing Maps. Springer-Verlag, Berling, 3 edition, 2001."},{"key":"e_1_3_2_1_16_1","volume-title":"Dept. of Applied Science","author":"Labib K.","year":"2002","unstructured":"K. Labib and R. Vemuri . NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report , Dept. of Applied Science , University of California , Davis , 2002 . K. Labib and R. Vemuri. NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis, 2002."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322526"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of the 7th USENIX Security Symp.","author":"Lee W.","year":"1998","unstructured":"W. Lee and S. Stolfo . Data mining approaches for intrusion detection . In Proc. of the 7th USENIX Security Symp. , San Antonio, TX , 1998 . W. Lee and S. Stolfo. Data mining approaches for intrusion detection. In Proc. of the 7th USENIX Security Symp., San Antonio, TX, 1998."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312212"},{"key":"e_1_3_2_1_21_1","volume-title":"Nov","author":"Levy E. A.","year":"1996","unstructured":"E. A. Levy . Smashing the stack for fun and profit. Phrack magazine, 7(49) , Nov 1996 . E. A. Levy. Smashing the stack for fun and profit. Phrack magazine, 7(49), Nov 1996."},{"key":"e_1_3_2_1_22_1","volume-title":"14th Annual Canadian Information Technology Security Symp.","author":"Lichodzijewski P.","year":"2002","unstructured":"P. Lichodzijewski , A. Zincir-Heywood , and M. Heywood . Dynamic intrusion detection using self organizing maps . In 14th Annual Canadian Information Technology Security Symp. , May 2002 . P. Lichodzijewski, A. Zincir-Heywood, and M. Heywood. Dynamic intrusion detection using self organizing maps. In 14th Annual Canadian Information Technology Security Symp., May 2002."},{"key":"e_1_3_2_1_23_1","volume-title":"The global k-means clustering algorithm. Pattern Recognition, 36(2)","author":"Likas A.","year":"2003","unstructured":"A. Likas , N. Vlassis , and J. J. Verbeek . The global k-means clustering algorithm. Pattern Recognition, 36(2) , 2003 . A. Likas, N. Vlassis, and J. J. Verbeek. The global k-means clustering algorithm. Pattern Recognition, 36(2), 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"e_1_3_2_1_26_1","first-page":"353","volume-title":"Proc. 20th NIST-NCSC Nat'l Information Systems Security Conf.","author":"Porras P. A.","year":"1997","unstructured":"P. A. Porras and P. G. Neumann . EMERALD: Event monitoring enabling responses to anomalous live disturbances . In Proc. 20th NIST-NCSC Nat'l Information Systems Security Conf. , pages 353 -- 365 , 1997 . P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proc. 20th NIST-NCSC Nat'l Information Systems Security Conf., pages 353--365, 1997."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972726.18"},{"key":"e_1_3_2_1_30_1","volume-title":"Tutorials of the 11th IEEE\/ACM Int'l Symp. on Modeling, Analysis and Simulation of Computer and Telecom. Systems - MASCOTS","author":"Serazzi G.","year":"2003","unstructured":"G. Serazzi and S. Zanero . Computer virus propagation models . In M. C. Calzarossa and E. Gelenbe, editors, Tutorials of the 11th IEEE\/ACM Int'l Symp. on Modeling, Analysis and Simulation of Computer and Telecom. Systems - MASCOTS 2003 . Springer-Verlag , 2003. G. Serazzi and S. Zanero. Computer virus propagation models. In M. C. Calzarossa and E. Gelenbe, editors, Tutorials of the 11th IEEE\/ACM Int'l Symp. on Modeling, Analysis and Simulation of Computer and Telecom. Systems - MASCOTS 2003. Springer-Verlag, 2003."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/872015.872093"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347160"},{"key":"e_1_3_2_1_33_1","first-page":"385","volume-title":"Proc. of the 16th Int'l Conf. on Pattern Recognition","volume":"4","author":"Yeung D.-Y.","year":"2002","unstructured":"D.-Y. Yeung and C. Chow . Parzen-window network intrusion detectors . In Proc. of the 16th Int'l Conf. on Pattern Recognition , volume 4 , pages 385 -- 388 , aug 2002 . D.-Y. Yeung and C. Chow. Parzen-window network intrusion detectors. In Proc. of the 16th Int'l Conf. on Pattern Recognition, volume 4, pages 385--388, aug 2002."}],"event":{"name":"SAC04: The 2004 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Nicosia Cyprus","acronym":"SAC04"},"container-title":["Proceedings of the 2004 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/967900.967988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T02:14:47Z","timestamp":1673316887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/967900.967988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3,14]]},"references-count":30,"alternative-id":["10.1145\/967900.967988","10.1145\/967900"],"URL":"https:\/\/doi.org\/10.1145\/967900.967988","relation":{},"subject":[],"published":{"date-parts":[[2004,3,14]]},"assertion":[{"value":"2004-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}