{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:48:15Z","timestamp":1749271695343},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540263197"},{"type":"electronic","value":"9783540316732"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11499305_39","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T05:39:11Z","timestamp":1270791551000},"page":"376-384","source":"Crossref","is-referenced-by-count":1,"title":["An Electronic Reconfigurable Neural Architecture for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"F. Ibarra","family":"Pic\u00f3","sequence":"first","affiliation":[]},{"given":"A. Grediaga","family":"Olivo","sequence":"additional","affiliation":[]},{"given":"F. Garc\u00eda","family":"Crespi","sequence":"additional","affiliation":[]},{"given":"A.","family":"Camara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","volume-title":"Information Security: An Integrated Collection of Essays","author":"M.D. Abrams","year":"1997","unstructured":"Abrams, M.D., Jajodia, S., Podell, H.J.: Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"39_CR2","unstructured":"Pfleeger, C.P.: Security in computing. PHH (1997)"},{"key":"39_CR3","unstructured":"CERT. Distributed denial of service tools. CERT Incident Note IN-99-07 (December 1999), \n                    \n                      http:\/\/www.cert.org\/incident_notes\/IN-99-07.html"},{"key":"39_CR4","unstructured":"CERT. Results of the distributed-systems intruder tools workshop (November 1999), \n                    \n                      http:\/\/www.cert.org\/reports\/dsit_workshop-final.html"},{"key":"39_CR5","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co. Fort Washington, PA (1980)"},{"key":"39_CR6","unstructured":"Kumar, S.: Classification and Detection of Computer Intrusion. PhD thesis, Purdue University (August 1995)"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An intrusion-detection model. In: Proceedings IEEE Symposium on Security and Privacy, Oakland, CA, May 1986, pp. 118\u2013131 (1986)","DOI":"10.1109\/SP.1986.10010"},{"key":"39_CR8","unstructured":"Fox, K.L., Henning, R., Reed, J.: A Neural Network Approach Towards Intrusion Detection. In: Proceedings of the 13th National Computer Security Conference, Washington, DC, October 1990, pp. 125\u2013134 (1990)"},{"key":"39_CR9","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX (1998)"},{"key":"39_CR10","volume-title":"Protection and Security on the Information Superhighway","author":"F. Cohen","year":"1995","unstructured":"Cohen, F.: Protection and Security on the Information Superhighway. John Wiley & Sons, Chichester (1995)"},{"key":"39_CR11","unstructured":"Amoroso, E.: Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace"},{"key":"39_CR12","unstructured":"Back, and Response. Intrusion.Net Books (1999)"},{"issue":"2","key":"39_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion detection model. IEEE Trans. Software Eng.\u00a0se-13(2), 222\u2013223 (1987)","journal-title":"IEEE Trans. Software Eng."},{"issue":"7","key":"39_CR14","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/306549.306571","volume":"42","author":"R. Durst","year":"1999","unstructured":"Durst, R., et al.: Testing an evaluation computer intrusion detection systems. Comm ACM\u00a042(7), 53\u201361 (1999)","journal-title":"Comm ACM"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11499305_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:42:04Z","timestamp":1619505724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11499305_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540263197","9783540316732"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11499305_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}