{“status”:“ok”,“message type”:“work”,“message version”:“1.0.0”,“message”:{“indexed”:{“date parts”:[[2024,3,2]],“date time”:“2024-03-02T21:20:41Z”,“timestamp”:1709414441765},“reference count”:36,“publisher”:“Hindawi Limited”,“license”:[{“start”:{“date parts”:[[2018,1,1]],“date time”:“2018-01-01T00:00:00Z”,“timestamp”:1514764800000},“content版本“:“unspecified”,“delay-in-days”:0,“URL”:“http://\/creativecommons.org\/licenses\/by\/4.0\/”}],“出资人”:[{“name”:“斯洛伐克APVV”,“奖项”:[“APVV-14-0598”]}],”content-domain“:{“domain”:[],“crossmark-restriction”:false},“short-container-title”:[”Security and Communication Networks“],“published-print”:{”date-parts“:[[2018]]},“抽象”:“随着计算机系统和计算机网络使用量的增加,入侵检测问题已成为网络安全中的一个重要问题。本文讨论了简化网络管理员工作的方法。我们将聚类方法应用于安全事件分析。我们认为K-均值、PAM和CLARA聚类算法。为此,我们使用了在Warden系统中从各种安全工具收集的数据。我们的目的不是区分正常和异常网络流量,而是根据安全事件的属性对类似的威胁代理进行分组。我们提出了精细分类和粗分类的情况,并讨论了这两种情况的优点<\/jats:p>“,”DOI“:”10.1155\/2018\/3614093“,”type“:”journal-article“,”created“:{”date-parts“:[[2018,3,25]],”date-time“:”2018-03-25T19:30:47Z“,”timestamp“:1522006247000},”page“:2018年“,”作者“:[{”给定“:”Tom\u00e1\u0161“,“family”:“Bajto\u0161”,“sequence”:“first”,“affiliation”:[{“name”:“斯洛伐克Ko\u0161ice,Ko\u061ice,Ko\ u0160af\ u00e1rik大学科学院”}]},{“given”:“Andrej”,“faily”:”Gajdo\u0171“,”sequence“:”additional“,”affiliation:[{”name“:”科学学院,Pavol Jozef\u0160af\u00e1rik University in Ko\u0161ice,Ko\u061ice,Slovakia“}]},{“given”:“Lenka”,“family”:“Kleinov\u00e”,“sequence”:“additional”,“affiliation”:[{“name”:“科学学院,帕沃尔·乔泽夫\u0160 af\u00 e1riK University on in Ko\u 0161ices,Ko\u,Slowakia”}]},}“ORCID”:/ORCID.org \/00000-0002-1670-821X“,”authenticated-orcid“:true,”given“:“Katar\u00edna”,“family”:“Lu\u010divjansk\u00e1”,“sequence”:“additional”,“affiliation”:[{“name”:“斯洛伐克科奥0161ice科奥乔泽夫\u0160af\u00e德里克大学科学院”}]},{“orcid”:“http://\orcid.org\/0000-0002-1967-8802”,“authenticationed-orcid”:true、“given”:Pavol“,“family”:“Sokol”,“sequence“:”additional“,”affiliation“:[{”name“:”斯洛伐克Ko\u0161ice Ko\u061ice Pavol Jozef\u0160af\u00e1rik大学科学院“}]}],”member“:”98“,”reference“:[[{“key”:“11”,”doi-asserted-by“:”publisher“,”doi“:”10.1201\/b10867“},{“key”:“43”,“doi-assert-by”:“publisher”,“doi”:“10.1007\/3-540-36084-0_7“},{“键”:“10”,”doi-asserted-by“:”publisher“,”doi“:”10.1016\/j.eswa.2005.005.002“},{“key”:“9”,“doi-assert-by”:“publisher”,“doi”:“10.1016\/S1389-1286(98)00017-6”},}“密钥”:“7”,“doi-assertd-by”:“publisher”,“DI:”10.1109\/comst.2015.2494502“}.,{”key“:”20“,”doi-asserted-by“”:“prisher”,“doi”:“10.1016\/j.cose.2008.08.003”},{“key”:“49”,“year”:“2014”,“journal-title”:“国际数据挖掘与知识管理过程杂志(IJDKP)“},{”issue“:”1“,”key“:”44“,”doi-asserted-by“:”crossref“,”first page“:“13”,”doi“:”10.33736\/jita.45.2014“,”volume“:1.003“},{”键“:”38“,”doi-asserted-by“:”publisher“,”doi“:”10.1016\/S0167-4048(02)00514-X“},{“key”:“5”,“doi-assert-by”:“publisher”,“doi”:“10.1145\/335191.335388”},“key“:”58“,”doi-assetd-by“:”publisher“,”doi“:2”,“年份”:“2016”},{“key”:“54”,“year”:“2006”}10.1002\/widm.30“},{“key”:“25”,“year”:“2010”},}“keys”:“17”,“doi-asserted-by”:“publisher”,“doi”:“10.1198\/016214502760047131”}、{“密钥”:“18”,“年份”:“2014”}“:”publisher“,”doi“:”10.1016\/j.csda.2006.04.030“},{”key“:”21“,”doi-asserted-by“:”publisher,“DOI”:“10.1007\/s11634-010-0064-5”},{“key”:“41”,“volume-title”:“使用R学习数据挖掘”,“year”:“2015”}“:”publisher“,”DOI“:”10.1016\/j.neucom.2017.06.053“},{”key“:”36“,”doi-asserted-by“:”publisher“,”doi“:”10.1016\/B978-0-12-396502-8.00020-6“},{“key”:“24”,“doi-assert-by”:“publisher”,“doi”:“10.1023\/a:1009769707641”},“key“:”33霍尔\/CRC现代统计方法手册”,“首页”:“1”,“volume-title“:”聚类分析:概述“,”年份“:”2016年“},{”问题“:”4“,”关键“:”6“,”首页“:”1“,”卷“:”25“,”年“:”2008“,”期刊标题“:”统计软件杂志“}”,{“问题”:“6”,”关键“:”2015“},{”密钥“:”19“,”doi-asserted-by“:”publisher“,”doi“:”10.1016\/j.patrec.2017.03.008“},{“key”:“37”,“doi-assert-by”:“publisher”,“doi”:“10.1007\/9781-4471-2386-6_47”},“key“:”40“,”year“:”2017“}],“container-title”:[“Security and Communication Networks”],“original-title“:[],”language“:”en“,”link“:[{”URL“:”http://\/downloads.hindawi.com/journals\/scn\/2018\/3614093.pdf“,“content-type”:“application\/pdf”,“content-version”:“vor”,“intended-application”:“text-mining”},{“URL”:“http://\downloads.hinadawi.com\/journals\/scn\/2018\/361493.xml”,“content-type“:”application\/xml“,”content-versiion“:”vor“,”intended-application“:”text-mining},{“URL”:“http://\/downloads.hindawi.com/journals\/scn\/2018\/3614093.pdf“,”content-type“:”unspecified“,”content-version“:”vor“,”intended-application“:”similarity-checking“}],”deposed“:{”date-parts“:[[2019,10,13]],”date-time“:“2019-10-13T08:03:06Z”,”timestamp“:1570953786000},“score”:1,“resource”:{“primary”:{“URL”:“https:\/\/www.hindawi.com/journals\/scn\/2018\/3614093\/“}},”subtitle“:[],”shorttitle“:[],”issued“:{”date-parts“:[[2018]]},“references-count”:36,”alternative-id“:[”3614093“,”3614093],“URL”:“http://\/dx.doi.org\/10.1155\/2018\/3614093”,“relation”:{},,“ISSN”:[“1939-”0114“,”1939-0122“],“ISSN-type”:[{“value”:“1939-0114”,“type”:“print”},{“value”:“1939-0122“,”type“:”electronic“}],”subject“:[],”published“:{”date-parts“:[[2018]]}}