{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:11:36Z","timestamp":1725567096791},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259145"},{"type":"electronic","value":"9783540320692"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427469_70","type":"book-chapter","created":{"date-parts":[[2010,9,27]],"date-time":"2010-09-27T19:29:48Z","timestamp":1285615788000},"page":"434-438","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion Detection Based on MLP Neural Networks and K-Means Algorithm"],"prefix":"10.1007","author":[{"given":"Hongying","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Lin","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Di","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","first-page":"3","volume":"2","author":"A. Sundaram","year":"1996","unstructured":"Sundaram, A.: An Introduction to Intrusion Detection. Special issue on computer security\u00a02, 3\u20137 (1996)","journal-title":"Special issue on computer security"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Caberera, J.B.D., Ravichandran, B.: Statistical Traffic Modeling for Network Intrusion Detection. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems 2000, vol.\u00a029, pp. 466\u2013473 (2000)","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"70_CR3","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","volume":"83","author":"M. Markou","year":"2003","unstructured":"Markou, M., Singh, S.: Novelty Detection: A Review.Part 2: Neural Network Based Approaches. Signal Processing\u00a083, 2499\u20132521 (2003)","journal-title":"Signal Processing"},{"key":"70_CR4","unstructured":"Axelsson, S.: Research in Intrusion Detection Systems: A Survey Technical Report. Dept. of Computer Engineering, Chalmers University of Technology, Sweden (1998); pp. 98-17, revised August 19, (1999)"},{"key":"70_CR5","doi-asserted-by":"crossref","unstructured":"Ghosh, A.K.: Detecting Anomalous and Unknown Intrusions Against Programs. In: Proceedings of IEEE 14th Annual Computer Security Applications Conference, pp. 259\u2013267 (1998)","DOI":"10.1109\/CSAC.1998.738646"},{"key":"70_CR6","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: Proceedings of the Symposium on Applications and the Internet 2003, pp. 27\u201331, 209\u2013216 (2003)","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"70_CR7","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.patcog.2003.09.011","volume":"37","author":"Y. Liu","year":"2004","unstructured":"Liu, Y., Chen, K., Liao, X.F.: A Genetic Clustering Method for Intrusion Detection. Pattern Recognition\u00a037, 927\u2013942 (2004)","journal-title":"Pattern Recognition"},{"key":"70_CR8","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/S1363-4127(98)80036-8","volume":"3","author":"F. Schepers","year":"1998","unstructured":"Schepers, F.: Internet Security Systems (ISS): Network-versus host-based intrusion detection. Information Security Technical Report\u00a03, 32\u201342 (1998)","journal-title":"Information Security Technical Report"},{"key":"70_CR9","doi-asserted-by":"crossref","unstructured":"Bai, Y., Kobayashi, H.: Intrusion Detection Systems: Technology and Development. In: 17th International Conference on Advanced Information Networking and Applications, pp. 27\u201329, 710\u2013715 (2003)","DOI":"10.1109\/AINA.2003.1192972"},{"key":"70_CR10","doi-asserted-by":"crossref","unstructured":"Bykova, M., Ostermann, S., Tjaden, B.: Detecting Network Intrusions via Statistical Analysis of Network Packet Characteristics. In: IEEE Southeastern Symposium on System Theory (SSST 2001), pp. 309\u2013314 (2001)","DOI":"10.1109\/SSST.2001.918537"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks \u2013 ISNN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427469_70.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:31Z","timestamp":1619507371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427469_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259145","9783540320692"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11427469_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}