{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:02:10Z","timestamp":1725566530824},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540269724"},{"type":"electronic","value":"9783540316930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11508069_25","type":"book-chapter","created":{"date-parts":[[2010,9,26]],"date-time":"2010-09-26T14:30:58Z","timestamp":1285511458000},"page":"187-194","source":"Crossref","is-referenced-by-count":3,"title":["Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model"],"prefix":"10.1007","author":[{"given":"\u00c1lvaro","family":"Herrero","sequence":"first","affiliation":[]},{"given":"Emilio","family":"Corchado","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"S\u00e1iz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"25_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/nem.433","volume":"12","author":"J.M. Myerson","year":"2002","unstructured":"Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. International Journal of Network Management\u00a012(3), 135\u2013144 (2002)","journal-title":"International Journal of Network Management"},{"key":"25_CR2","first-page":"411","volume":"5","author":"K. H\u00e4t\u00f6nen","year":"2000","unstructured":"H\u00e4t\u00f6nen, K., H\u00f6glund, A., Sorvari, A.: A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. International Joint Conference of Neural Networks\u00a05, 411\u2013416 (2000)","journal-title":"International Joint Conference of Neural Networks"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Zanero, S., Savaresi, S.M.: Unsupervised Learning Techniques for an Intrusion Detection System. In: ACM Symposium on Applied Computing, pp. 412\u2013419 (2004)","DOI":"10.1145\/967900.967988"},{"key":"25_CR4","unstructured":"Ghosh, A., Schwartzbard, A., Schatz, A.: Learning Program Behavior Profiles for Intrusion Detection. In: Workshop on Intrusion Detection and Network Monitoring, pp. 51\u201362 (1999)"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: IEEE Symposium on Research in Computer Security and Privacy, Oakland, California (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-211-27389-1_109","volume-title":"International Conference on Adaptive and Natural Computing Algorithms","author":"E. Corchado","year":"2005","unstructured":"Corchado, E., Herrero, A., Baruque, B., Saiz, J.M.: Intrusion Detection System Based on a Cooperative Topology Preserving Method. In: International Conference on Adaptive and Natural Computing Algorithms. LNCS, pp. 454\u2013457. Springer, Heidelberg (2005)"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/T-C.1974.224051","volume":"23","author":"J. Friedman","year":"1974","unstructured":"Friedman, J., Tukey, J.: A Projection Pursuit Algorithm for Exploratory Data Analysis. IEEE Transaction on Computers\u00a023, 881\u2013890 (1974)","journal-title":"IEEE Transaction on Computers"},{"issue":"4","key":"25_CR8","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1162\/089976601300014394","volume":"13","author":"A. Hyv\u00e4rinen","year":"2001","unstructured":"Hyv\u00e4rinen, A.: Complexity Pursuit: Separating Interesting Components from Time Series. Neural Computation\u00a013(4), 883\u2013898 (2001)","journal-title":"Neural Computation"},{"issue":"3","key":"25_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:DAMI.0000023673.23078.a3","volume":"8","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery\u00a08(3), 203\u2013225 (2004)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"25_CR10","unstructured":"Fyfe, C., Corchado, E.: Maximum Likelihood Hebbian Rules. In: European Symposium on Artificial Neural Networks (2002)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Denning, D.: An Intrusion Detection Model. IEEE Transactions on Software Engineering\u00a0SE-13(2) (1987)","DOI":"10.1109\/TSE.1987.232894"},{"issue":"4","key":"25_CR12","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1080\/09528130310001611603","volume":"15","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters Using Lateral Connections. Journal of Experimental and Theoretical Artificial Intelligence\u00a015(4), 473\u2013487 (2003)","journal-title":"Journal of Experimental and Theoretical Artificial Intelligence"},{"issue":"8","key":"25_CR13","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1142\/S0218001403002915","volume":"17","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. International Journal of Pattern Recognition and Artificial Intelligence\u00a017(8), 1447\u20131466 (2003)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Corchado, E., Corchado, J.M., S\u00e1iz, L., Lara, A.: Constructing a Global and Integral Model of Business Management Using a CBR System. In: First International Conference on Cooperative Design, Visualization and Engineering, pp. 141\u2013147 (2004)","DOI":"10.1007\/978-3-540-30103-5_16"},{"key":"25_CR15","first-page":"350","volume":"10","author":"H.S. Seung","year":"1998","unstructured":"Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems\u00a010, 350\u2013356 (1998)","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"1-2","key":"25_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1023\/A:1009606706736","volume":"6","author":"C. Fyfe","year":"1997","unstructured":"Fyfe, C.: A Neural Network for PCA and Beyond. Neural Processing Letters\u00a06(1-2), 33\u201341 (1997)","journal-title":"Neural Processing Letters"},{"key":"25_CR17","unstructured":"Cisco Secure Consulting: Vulnerability Statistics Report (2000)"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Case, J., Fedor, M.S., Schoffstall, M.L., Davin, C.: Simple Network Management (SNMP). RFC-1157 (1990)","DOI":"10.17487\/rfc1157"},{"key":"25_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1142\/S0129065789000475","volume":"1","author":"E. Oja","year":"1989","unstructured":"Oja, E.: Neural Networks, Principal Components and Subspaces. International Journal of Neural Systems\u00a01, 61\u201368 (1989)","journal-title":"International Journal of Neural Systems"},{"key":"25_CR20","volume-title":"The Grid: Blueprint for a New Computing Infrastructure","author":"I. Foster","year":"1998","unstructured":"Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure, 1st edn. Morgan Kaufmann Publishers, San Francisco (1998)","edition":"1"},{"key":"25_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"European Grid Conference","author":"S. Kenny","year":"2005","unstructured":"Kenny, S.: Towards a Grid-wide Intrusion Detection System. In: European Grid Conference. LNCS. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning - IDEAL 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11508069_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:03:47Z","timestamp":1605625427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11508069_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540269724","9783540316930"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11508069_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}