{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:18:11Z","timestamp":1762175891487},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540282273"},{"type":"electronic","value":"9783540319078"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11538356_45","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T10:24:05Z","timestamp":1127816645000},"page":"433-442","source":"Crossref","is-referenced-by-count":13,"title":["Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches"],"prefix":"10.1007","author":[{"given":"Hai-Tao","family":"He","sequence":"first","affiliation":[]},{"given":"Xiao-Nan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Bao-Lu","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"45_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1219056","volume":"1","author":"D. Moore","year":"2003","unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer Worm. IEEE Security and Privacy Magazine\u00a01(4), 33\u201339 (2003)","journal-title":"IEEE Security and Privacy Magazine"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Chen, T.M., Robert, J.-M.: Worm Epidemics in High-Speed Networks. IEEE Computer, 48\u201353 (June 2004)","DOI":"10.1109\/MC.2004.36"},{"key":"45_CR3","unstructured":"Lee, W., Stolfo, S., Mok, K.: A Data Mining Framework for Buiding Intrusion Detection Models. In: Proc. of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA (May 1999)"},{"key":"45_CR4","volume-title":"Pattern Recognition","author":"S. Theodoridis","year":"2003","unstructured":"Theodoridis, S., Koutroumbas, K.: Pattern Recognition, 2nd edn. Elsevier Science, Amsterdam (2003)","edition":"2"},{"key":"45_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/978-3-540-45235-5_73","volume-title":"Information Networking","author":"D.S. Kim","year":"2003","unstructured":"Kim, D.S., Park, J.S.: Network-Based Intrusion Detection with Support Vector Machines. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol.\u00a02662, pp. 747\u2013756. Springer, Heidelberg (2003)"},{"key":"45_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44989-2_38","volume-title":"Artificial Neural Networks and Neural Information Processing - ICANN\/ICONIP 2003","author":"A. Hofmann","year":"2003","unstructured":"Hofmann, A., Schmitz, C., Sick, B.: Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers. In: Kaynak, O., Alpayd\u0131n, E., Oja, E., Xu, L. (eds.) ICANN 2003 and ICONIP 2003. LNCS, vol.\u00a02714, pp. 316\u2013324. Springer, Heidelberg (2003)"},{"key":"45_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-45248-5_3","volume-title":"Recent Advances in Intrusion Detection","author":"M. Ramadas","year":"2003","unstructured":"Ramadas, M., Ostermann, S., Tjaden, B.: Detecting Anomalous Network Traffic with Self\u2013organizing Maps. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 36\u201354. Springer, Heidelberg (2003)"},{"key":"45_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-45248-5_12","volume-title":"Recent Advances in Intrusion Detection","author":"S.\u2013B. Cho","year":"2003","unstructured":"Cho, S.\u2013B., Han, S.\u2013J.: Two Sophisticated Techniques to Improve HMM\u2013 Based Intrusion Detection Systems. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 207\u2013219. Springer, Heidelberg (2003)"},{"key":"45_CR9","series-title":"LNAI","first-page":"576","volume-title":"PAKDD 2003","author":"S.H. Oh","year":"2003","unstructured":"Oh, S.H., Lee, W.S.: Optimized Clustering for Anomaly Intrusion Detection. In: Whang, K.-Y., Jeon, J., Shim, K., Srivatava, J. (eds.) PAKDD 2003. LNCS (LNAI), vol.\u00a02637, pp. 576\u2013581. Springer, Heidelberg (2003)"},{"key":"45_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0167-9473(03)00177-4","volume":"45","author":"S.L. Scott","year":"2004","unstructured":"Scott, S.L.: A Bayesian Paradigm for Designing Intrusion Detection Systems. Computational Statistics & Data Analysis\u00a045, 69\u201383 (2004)","journal-title":"Computational Statistics & Data Analysis"},{"issue":"8","key":"45_CR11","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1109\/TSP.2003.814797","volume":"51","author":"M. Thottan","year":"2003","unstructured":"Thottan, M., Ji, C.: Anomaly Detection in IP Networks. IEEE Tran. on Signal Processing\u00a051(8), 2191\u20132204 (2003)","journal-title":"IEEE Tran. on Signal Processing"},{"key":"45_CR12","unstructured":"Anderson, J.P.: Computer Secuirty Threat Monitoring and Surveillance. Technical Report, Fort Washington. Pennsyslvania (April 1980)"},{"issue":"2","key":"45_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion Detection Model. IEEE Trans. on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"45_CR14","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"D.-Y. Yeung","year":"2003","unstructured":"Yeung, D.-Y., Ding, Y.: Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models. Pattern Recognition\u00a036, 229\u2013243 (2003)","journal-title":"Pattern Recognition"},{"key":"45_CR15","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T. Verwoerd","year":"2002","unstructured":"Verwoerd, T., Hunt, R.: Intrusion Detection Techniques and Approaches. Computer Commnications\u00a025, 1356\u20131365 (2002)","journal-title":"Computer Commnications"},{"issue":"3","key":"45_CR16","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data Clustering: A Review. ACM Computing Surveys\u00a031(3), 264\u2013323 (1999)","journal-title":"ACM Computing Surveys"},{"issue":"3","key":"45_CR17","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/21.256541","volume":"23","author":"J.S.R. Jang","year":"1993","unstructured":"Jang, J.S.R.: ANFIS: Adaptive\u2013Network-Based Fuzzy Inferrence System. IEEE Trans. on Systems, Man and Cybernetics\u00a023(3), 665\u2013685 (1993)","journal-title":"IEEE Trans. on Systems, Man and Cybernetics"},{"key":"45_CR18","unstructured":"KDD Cup 1999 Data (1999), http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"45_CR19","unstructured":"Stolfo, S.J., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost\u2013 Based Modeling and Evaluation for Data Mining with Application to Fraud and Intrusion Detection: Results from the JAM Project. Technical Report (2000)"}],"container-title":["Lecture Notes in Computer Science","Advances in Intelligent Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11538356_45.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:13:26Z","timestamp":1605626006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11538356_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540282273","9783540319078"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11538356_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}