{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:54:06Z","timestamp":1725468846086},"publisher-location":"Boston, MA","reference-count":23,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387342238"},{"type":"electronic","value":"9780387342245"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/0-387-34224-9_27","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T14:54:56Z","timestamp":1156517696000},"page":"228-235","source":"Crossref","is-referenced-by-count":4,"title":["An Intrusion Detection System for Network-Initiated Attacks Using a Hybrid Neural Network"],"prefix":"10.1007","author":[{"given":"Stefanos","family":"Koutsoutos","sequence":"first","affiliation":[]},{"given":"Ioannis T.","family":"Christou","sequence":"additional","affiliation":[]},{"given":"Sofoklis","family":"Efremidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"W. Lee, S. Stolfo, K. Mok: \u201cA Data Mining Framework for Building Intrusion Detection Models\u201d-Proceedings of the 1999 IEEE Symposium on Security and Privacy (May 1999)"},{"key":"27_CR2","unstructured":"H. Debar, M. Becker, D. Siboni: \u201cA Neural Network Component for an Intrusion Detection System\u201d-Proceedings of the 1998 National Information Systems Security Conference (NISSC\u201998) October 5\u20138 1998. Arlington, VA."},{"key":"27_CR3","unstructured":"LiMin Fu: \u201cA Neural Network Model for Learning Rule-Based Systems\u201d-Proceedings of the 1992 International Joint Conference on Neural Networks, I-343:I\u2013348. [R, L]."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"H. Teng, K. Chen, S. Lu: \u201cAdaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns\u201d-Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 278\u2013284, Oakland CA, May 1990.","DOI":"10.1109\/RISP.1990.63857"},{"key":"27_CR5","unstructured":"T. Lane, C. Brodley: \u201cApproaches to Online Learning and Concept Drift for User Identification in Computer Security\u201d-Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, pp. 259\u2013263 (1998)."},{"key":"27_CR6","volume-title":"Computer Security Threat Monitoring and Surveillance","author":"J. Anderson","year":"1980","unstructured":"J. Anderson: \u201cComputer Security Threat Monitoring and Surveillance\u201d-Tech. Rep., James P Anderson Co., Fort Washington, PA, Apr. 1980."},{"key":"27_CR7","unstructured":"A. Lazarevic, P. Dokas, L. Ertoz, V. Kumar, J. Srivastava, P. Tan: \u201cCyber Threat Analysis-A Key Enabling Technology for the Objective Force (A case study in Network Intrusion Detection)\u201d-Proceedings 23rd Army Science Conference, Orlando, FL, December 2002."},{"key":"27_CR8","unstructured":"P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan: \u201cData Mining for Network Intrusion Detection\u201d-Tutorial at the Pacific-Asia Conference on Knowledge Discovery in Databases, Seoul, April 30, 2003."},{"key":"27_CR9","unstructured":"C. Warrender, S. Forrest, B. Pearlmutter: \u201cDetecting Intrusions using System Calls-Alternative Data Models\u201d-IEEE Symposium on Security and Privacy (1998)."},{"key":"27_CR10","unstructured":"L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, P. Dokas, V. Kumar, J. Srivastava: \u201cDetection and Summarization of Novel Network Attacks Using Data Mining\u201d-Minnesota INtrusion Detection System (MINDS) Technical Report, 2003."},{"key":"27_CR11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2014.001.0001","volume-title":"Computational Explorations in Cognitive Neuroscience: Understanding the Mind by Simulating the Brain","author":"R. C. O\u2019Reilly","year":"2000","unstructured":"R. C. O\u2019Reilly, and Y. Munakata: \u201cComputational Explorations in Cognitive Neuroscience: Understanding the Mind by Simulating the Brain\u201d, MIT Press, Boston, MA, 2000."},{"key":"27_CR12","volume-title":"Real-Time Intrusion Detection","author":"T. Lunt","year":"1992","unstructured":"T. Lunt: \u201cReal-Time Intrusion Detection\u201d-Technical report, Computer Science Laboratory, SRI international, Menlo Park, CA, February 1992."},{"key":"27_CR13","unstructured":"J. Frank: \u201cArtificial Intelligence and Intrusion Detection \u2014 Current and Future Directions\u201d-Technical Report, Division of Comp. Science, University of California at Davis, 1994."},{"key":"27_CR14","unstructured":"J. Ryan, M. Lin, R. Miikkulainen: \u201cIntrusion Detection with Neural Networks\u201d-AI Approaches to Fraud Detection and Risk Management: Papers from the 1997 AAAI Workshop (Providence, Rhode Island), pp. 72\u201379. Menlo Park, CA: AAAI."},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"M. Mahoney, P. Chan: \u201cLearning Rules for Anomaly Detection of Hostile Network Traffic\u201d-Proceedings of the Third IEEE International Conference on Data Mining, p.601, November 19\u201322, 2003","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"27_CR16","unstructured":"A. Ghosh, A. Schwartzbard, M. Schatz: \u201cLearning Program Behavior Profiles for Intrusion Detection\u201d-Reliable Software Technologies Corporation, 1999."},{"key":"27_CR17","unstructured":"J. Cannady: \u201cArtificial Neural Networks for Misuse Detection\u201d-National Information Systems Security Conference (1998)."},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"L. Ertoz, A. Lazarevic, E. Eilertson, P. Tan, P. Dokas, V. Kumar, J. Srivastava: \u201cProtecting Against Cyber Threats in Networked Information Systems\u201d-SPIE Annual Symposium on AeroSense, Battlespace Digitization and Network Centric Systems III, Orlando, FL (2003)","DOI":"10.1117\/12.487410"},{"key":"27_CR19","unstructured":"L. Lankewicz, M. Benard: \u201cReal-time Anomaly Detection Using a Nonparametric Pattern Recognition Approach\u201d-Proceedings of the of 7th Computer Security Applications conf., San Antonio, TX, 1991."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"J. Shavlik, M. Shavlik: \u201cSelection, Combination and Evaluation of Effective Software Sensors for Detecting Abnormal Usage on Computers Running Windows NT\/2000\u201d-Shavlik Technologies Apr. 2002.","DOI":"10.21236\/ADA406316"},{"key":"27_CR21","unstructured":"K. Ilgun: \u201cUSTAT: A Real-time Intrusion Detection System for UNIX\u201d Proceedings of the IEEE Symposium on Security and Privacy, Oak-land, CA, May 1993."},{"key":"27_CR22","unstructured":"N. Bose, P. Liang: \u201cNeural Network Fundamentals with Graphs, Algorithms, and Applications\u201d \u2014 McGraw-Hill, 1996."},{"key":"27_CR23","unstructured":"W. W. Cohen, and Y. Singer, \u201cSimple Fast & Effective Rule Learner\u201d, AAAI\/IAAI 1999, pp. 335\u20133"}],"container-title":["IFIP International Federation for Information Processing","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34224-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,18]],"date-time":"2020-04-18T00:17:54Z","timestamp":1587169074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34224-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9780387342238","9780387342245"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/0-387-34224-9_27","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2006]]}}}