{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:38:27Z","timestamp":1729661907653,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.23919\/fruct.2017.8071329","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:29:28Z","timestamp":1508959768000},"page":"322-327","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of E-mail communication activities for detecting patterns of pathological behaviour"],"prefix":"10.23919","author":[{"given":"Michael","family":"Negnevitsky","sequence":"first","affiliation":[]},{"given":"Mark Jyn-Huey","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Jacky","family":"Hartnett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.026121"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2004.01.005"},{"journal-title":"Pajek &#x2014; Program for Large Network Analysis","year":"2004","author":"batagelj","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.046132"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"journal-title":"NIST Special Publication 800&#x2013;31 Intrusion Detection Systems","year":"2004","author":"bace","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1214\/ss\/998929476","article-title":"Computer intrusion: Detecting masquerades","volume":"16","author":"schonlau","year":"2001","journal-title":"Statistical Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.824828"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45215-7_5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.026112"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1081058"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.065103"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.67.056104"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of &#x2018;small-world&#x2019; networks","volume":"393","author":"watts","year":"1998","journal-title":"Nature"},{"key":"ref7","first-page":"1438","article-title":"Modeling email communications","volume":"e87d","author":"tsai","year":"2004","journal-title":"IEICE Transactions on Information and Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.036122"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"barabasi","year":"1999","journal-title":"Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/586143.586146"},{"journal-title":"Artificial Intelligence A Guide to Intelligent Systems","year":"2011","author":"negnevitsky","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/362342.362367"},{"key":"ref24","first-page":"50","article-title":"Neural network based anomaly detection in computer networks: a novel training paradigm","author":"sharafat","year":"2003","journal-title":"ISCA 16th International Conference Computer Applications in Industry and Engineering"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24767-8_74"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques with Java Implementations","year":"2000","author":"witten","key":"ref26"},{"journal-title":"Data Mining Concepts and Techniques Morgan Kaufmann Series in Data Management Systems","year":"2001","author":"han","key":"ref25"}],"event":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","start":{"date-parts":[[2017,4,3]]},"location":"St-Petersburg, Russia","end":{"date-parts":[[2017,4,7]]}},"container-title":["2017 20th Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8053875\/8071282\/08071329.pdf?arnumber=8071329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T04:41:31Z","timestamp":1570250491000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/8071329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":26,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.23919\/fruct.2017.8071329","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}