{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T18:20:51Z","timestamp":1759774851950},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259145"},{"type":"electronic","value":"9783540320692"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427469_68","type":"book-chapter","created":{"date-parts":[[2010,9,27]],"date-time":"2010-09-27T19:29:48Z","timestamp":1285615788000},"page":"421-427","source":"Crossref","is-referenced-by-count":1,"title":["A Genetic SOM Clustering Algorithm for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Zhenying","family":"Ma","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","unstructured":"Lee, W.: A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. Ph.D. Thesis, Columbia University, USA (1999)"},{"key":"68_CR2","doi-asserted-by":"crossref","unstructured":"Lee, W., Stolfo, S.J., Mok, K.: Data Mining in Work Flow Environments: Experience in Intrusion Detection. In: Proceedings of the 1999 Conference on Knowledge Discovery and Data Mining (KDD 1999), San Diego, pp. 114\u2013124 (1999)","DOI":"10.1145\/312129.312212"},{"key":"68_CR3","unstructured":"Lee, W., Stolfo, S.J.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the 1998 USENIX Security Symposium, San Antonio, pp. 79\u201384 (1998)"},{"key":"68_CR4","unstructured":"Eskin, E.: Anomaly Detection over Noisy Data Using Learned Probability Distributions. In: Proceedings of the International Conference on Machine Learning, USA, pp. 255\u2013262 (2000)"},{"key":"68_CR5","volume-title":"Cluster Analysis for Application","author":"M.R. Anderberg","year":"1973","unstructured":"Anderberg, M.R.: Cluster Analysis for Application. Academic Press, New York (1973)"},{"key":"68_CR6","volume-title":"Self-Organizing Maps","author":"T. Kohonen","year":"2000","unstructured":"Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer, Heidelberg (2000) ISBN 3-540-67921-9","edition":"3"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Lichodzijewski, P., Zincir-Heywood, A.N., Heywood, M.I.: Host-based Intrusion Detection Using Self-Organizing Maps. In: IEEE International Joint Conference on Neural Networks, pp. 1714\u20131719 (2002)","DOI":"10.1109\/IJCNN.2002.1007776"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Hoglund, A.J., Hatonen, K., Sorvari, A.S.: A computer Host Based User Abnormal Detection System Using the Self Organizing Map. In: Proceedings of the International Joint Conference on Neural Networks, IEEE IJCNN, vol.\u00a05, pp. 411\u2013416 (2000)","DOI":"10.1109\/IJCNN.2000.861504"},{"key":"68_CR9","unstructured":"Cannady, J.: Artificial Neural Networks for Misuse Detection. In: Proceedings of the 1998 National Information Systems Security Conference (NISSC 1998), pp. 443\u2013456 (1998)"},{"key":"68_CR10","unstructured":"Girardin, L.: An Eye on Network Intruder Administrator Shootouts. In: Proceedings of the workshop on Intrusion Detection and Network Monitoring (ID 1999), pp. 19\u201328 (1999)"},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Ramadas, M., Ostermann, S., Tjaden, B.: Detecting Anomalous Network Traffic with Self-Organizing Maps. In: Recent Advances in Intrusion Detection, 6th International Symposium, pp. 36\u201354 (2003)","DOI":"10.1007\/978-3-540-45248-5_3"},{"key":"68_CR12","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0031-3203(94)90063-9","volume":"27","author":"G.P. Babu","year":"1994","unstructured":"Babu, G.P., Murty, M.N.: Clustering with Evolution Strategies. Pattern Recognition\u00a027, 321\u2013329 (1994)","journal-title":"Pattern Recognition"},{"key":"68_CR13","unstructured":"KDD 1999 Cup data set (1999), http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks \u2013 ISNN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427469_68.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:56:27Z","timestamp":1605642987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427469_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259145","9783540320692"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11427469_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}