{"_id":"ikRfFv8EQwKkRoAyA","bibbaseid":"collins-reiter-anomalydetectionamidstconstantanomaliestrainingidsonconstantlyattackeddata-2008","author_short":["Collins, M.","Reiter, M."],"bibdata":{"bibtype":"article","type":"article","title":"Anomaly detection amidst constant anomalies: Training IDS on constantly attacked data","author":[{"propositions":[],"lastnames":["Collins"],"firstnames":["MP"],"suffixes":[]},{"propositions":[],"lastnames":["Reiter"],"firstnames":["MK"],"suffixes":[]}],"journal":"Technical Report CMU-CYLAB-08–006","year":"2008","bibtex":"@article{collins2008anomaly,\n title={Anomaly detection amidst constant anomalies: Training IDS on constantly attacked data},\n author={Collins, MP and Reiter, MK},\n journal={Technical Report CMU-CYLAB-08--006},\n year={2008}\n}\n\n","author_short":["Collins, M.","Reiter, M."],"bibbaseid":"collins-reiter-anomalydetectionamidstconstantanomaliestrainingidsonconstantlyattackeddata-2008","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/f/JcpNyPQsGxN5CWQ8o/mcollins-2023.bib","dataSources":["y4RyeRe4WtLQogMSG"],"keywords":[],"search_terms":["anomaly","detection","amidst","constant","anomalies","training","ids","constantly","attacked","data","collins","reiter"],"title":"Anomaly detection amidst constant anomalies: Training IDS on constantly attacked data","year":2008}