{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2024,5,30]],“日期时间”:“2024-05-30T13:09:47Z”,“时间戳”:1717074587682},“引用计数”:29,“发布者”:“IEEE”,“内容域”:{“域”:[],“交叉标记限制”:false},”短容器时间“:[]”,“published-print”:{“日期部分”:[[2006,12]]},“DOI”:“10.1109\/icdm.2006.165”,“type”:“procesdings-article”,“created”:{“date-parts”:[[2007,1,10]],“date-time”:“2007-01-10T10:58:29Z”,“timestamp”:1168426709000},“source”:《Crossref》,“is-referenced-by-count”:133,“title”:[“使用一类SVM分类器集成到基于硬负载的异常检测系统”],“前缀”:“101109”,“author”用法:[{“given”:“Roberto”,“family”:“Perdisci”,“sequence”:“first”,“affiliation”:[]},{“fixed”:“Guofie”,“家庭”:“Gu”,”sequence“:”additional“,”affiliance“:[]{,”given“:”Wenke“,”family“:”Lee,“doi”:“10.1109\/52.877859”},{“键”:“17”,“doi-asserted-by”:“publisher”,“doi”:“10.1023\/A:1012491419635”},{“key”:“18”,“doo-asserted-by”:”publisher“,”doi“:”10.1145\/952589.952601“},“key“:”15“,”doi-assert-by“:”publister“,”doi“:“10.1145\/508791.508835”}002\/0471660264“},{”key“:”13“,”doi-asserted-by“:”publisher“,”doi“:“10.1016\/S0167-8655(03)00004-7”},{“key”:“14”,“article-title”:“使用静态二进制分析自动模拟攻击”,“author”:“kruegel”,“year”:“2005”,“journal-title“:”USENIX Security Symposium“},”{“密钥”:“11”,“作者”:“firewarker”,“年份”:“2006”,“日志标题”:“Windows Media Services远程命令执行漏洞利用”}:“Polymorphic blending attack”,“author”:“fogla”,“year”:“2006”,“journal-title”:“USENIX Security Symposium”},{“key”:“21”,“doi-asserted-by”:“publisher”,“doi”:“10.1162\/089976601750264965”}:“Proc ACM CSS Workshop on Data Mining Applied to Security”},{“key”:“22”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/505282.505283”}0英寸,“article-title”:“组合一类分类器”,“author”:“tax”,“year”:“2001”,“journal-title“:“Multiple classifiers System(MCS)”},{“key”:“25”,“doi-asserted-by”:“crossref”,“doi”:“10.1007\/3-540-36084-0_15”,“article-title”:“通过抽象负载执行准确检测缓冲区溢出”,“author”:“tos”,“年份”:“2002”,“日记标题”:“入侵检测(RAID)的最新进展”},{“key”:“26”,“author”:“vapnik”,“year”:“1998”,“journal-title”:“统计学习理论”}:“基于异常付费负载的网络入侵检测”,“author”:“wang”,“year”:“2004”,“journal-title”:“入侵检测(RAID)的最新进展”},{“key”:“29”,“article-title“:“基于非正常付费负载的蠕虫检测和签名生成”,“author”:“wang“,“year:”2005“,”journal-title“:”“入侵检测的最新发展(RAID)”}、{“密钥”:“3”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/34.464560”},{“key”:“2”,“year”:“0”}:“数据挖掘在计算机安全中的应用”},{“key”:“1”,“year”:“0”}tle“:“一种检测网络流中漏洞代码的快速静态分析方法”,“author”:“chinchani”,“year”:“2005”,“journal-title”:“Recent Advances in Intrusion Detection(RAID)”},{“key”:“4”,“author”:“chang”,“year”:《2001》,“jornal-tittle”:《LIBSVM A library for support vector machines》},},“key“9”,“作者”:“duda”,“年份”:“2000”,“journal-ttitle”:“Pattern Classification”},{“key”:“8”,“doi-asserted-by”:“crossref”,“doi”:“10.1007\/3-540-45014-9_1”,《article-title》:“机器学习中的集合方法”,“author”:“dieterich”,“year”:“2000”,“journal-title”:“Multiple Classifiers System(MCS)”}],“event”:{“name”:“Sixth International Conference on Data Mining(ICDM'06)”,“location”:“Hong Kong,China”,“start”:{“date-parts”:[[2006,12,18]]},“end”:{“date-parts”:[2006,12,22]]}},”container-title“:[“第六届国际数据挖掘大会(ICDM'06)”],“original-title”:[],“link”:[{“URL”:“http://\xplorestaging.ieee.org\/ielx5\/4053012\/4053013\/040053075.pdf?arnumber=4053075”,“content-type”:“unspecified',”content-version“:”vor“,“意向应用程序”:“相似性检查”}],“存放”:{“日期部分”:[[2017,6,17]],“日期时间”:“2017-06-17T08:56:51Z”,“时间戳”:1497689811000},“分数”:1,“资源”:{primary:{”URL“:”http://ieeexplore.iee.org\/document\/405075\/“}”,“副标题”:[],“短标题”:[],“已发布”:[[2006,12]]},“references-count”:29,“URL”:“http://\/dx.doi.org\/10.109\/icdm.2006.165”,“关系”:{},“ISSN”:[“1550-4786”],“ISSN-type”:[{“value”:“1550-4.786”,“type”:“print”}],“主题”:[],“发布”:{“date-parts”:[[2006,12]]}}}