{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:59:39Z","timestamp":1725465579952},"publisher-location":"New York","reference-count":5,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"038723151X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-23152-8_22","type":"book-chapter","created":{"date-parts":[[2006,1,19]],"date-time":"2006-01-19T01:36:28Z","timestamp":1137634588000},"page":"171-174","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion Detection Based on Organizational Coevolutionary Fuzzy Classifiers"],"prefix":"10.1007","author":[{"given":"Fang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhen-guo","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"22_CR1","first-page":"446","volume":"26","author":"J. Liu","year":"2003","unstructured":"Liu Jing, Zhong Wei-Cai, Liu Fang, Jiao Li-Cheng. Classification based on organization coevolutionary algorithm. Chiense Journal of Computers, 2003, 26(4): 446\u2013453 (in Chinese).","journal-title":"Chiense Journal of Computers"},{"key":"22_CR2","unstructured":"W. Lee, S. J. Stolfo, and K. W. Mok, \u201cMining audit data to build intrusion detection models\u201d, Proc. Int. Conf. Knowledge Discovery and Data Mining (KDD\u201998), pages 66\u201372, 1998."},{"key":"22_CR3","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S. A. Hofmeyr","year":"1998","unstructured":"S. A. Hofmeyr, A. Somayaji, and S. Forrest, \u201cIntrusion detection using sequences of systems call\u201d, Journal of Computer Security, 6: 151\u2013180, 1998.","journal-title":"Journal of Computer Security"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"338:353","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L.A. Zadeh","year":"1965","unstructured":"Zadeh, L..A.. Fuzzy Sets. Information and Control 8:338:353 1965","journal-title":"Information and Control"},{"key":"22_CR5","unstructured":"W. Fan, W. Lee, M. Miller, S. J. Stolfo, and P. K. Chan, \u201cUsing artificial anomalies to detect unknown and know network intrusions\u201d, Proceedings of the First IEEE International Conference on Data Mining, 2001."}],"container-title":["IFIP International Federation for Information Processing","Intelligent Information Processing II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-23152-8_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:36:47Z","timestamp":1619483807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-23152-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["038723151X"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/0-387-23152-8_22","relation":{},"subject":[]}}