{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:22Z","timestamp":1725560182014},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283232"},{"type":"electronic","value":"9783540318538"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11539087_103","type":"book-chapter","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T22:26:10Z","timestamp":1279664770000},"page":"778-782","source":"Crossref","is-referenced-by-count":3,"title":["An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending"],"prefix":"10.1007","author":[{"given":"\u00c1lvaro","family":"Herrero","sequence":"first","affiliation":[]},{"given":"Emilio","family":"Corchado","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"S\u00e1iz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"103_CR1","unstructured":"Planquart, J.-P.: Application of Neural Networks to Intrusion Detection. Information Security Reading Room - SANS (SysAdmin, Audit, Network, Security) Institute (2002)"},{"key":"103_CR2","doi-asserted-by":"crossref","unstructured":"H\u00e4t\u00f6nen, K., H\u00f6glund, A., Sorvari, A.: A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. In: International Joint Conference of Neural Networks (2000)","DOI":"10.1109\/IJCNN.2000.861504"},{"key":"103_CR3","unstructured":"Ghosh, A., Schwartzbard, A., Schatz, A.: Learning Program Behavior Profiles for Intrusion Detection. In: Workshop on Intrusion Detection and Network Monitoring (1999)"},{"key":"103_CR4","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: IEEE Symposium on Research in Computer Security and Privacy (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"103_CR5","series-title":"Springer Computer Science","volume-title":"International Conference on Adaptive and Natural Computing Algorithms","author":"E. Corchado","year":"2005","unstructured":"Corchado, E., Herrero, A., Baruque, B., Saiz, J.M.: Intrusion Detection System Based on a Cooperative Topology Preserving Method. In: International Conference on Adaptive and Natural Computing Algorithms. Springer Computer Science. Springer\/Wien, NewYork (2005)"},{"key":"103_CR6","doi-asserted-by":"crossref","unstructured":"Friedman, J., Tukey, J.: A Projection Pursuit Algorithm for Exploratory Data Analysis. IEEE Transaction on Computers (23), 881\u2013890 (1974)","DOI":"10.1109\/T-C.1974.224051"},{"key":"103_CR7","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1162\/089976601300014394","volume":"13","author":"A. Hyv\u00e4rinen","year":"2001","unstructured":"Hyv\u00e4rinen, A.: Complexity Pursuit: Separating Interesting Components from Time Series. Neural Computation\u00a013, 883\u2013898 (2001)","journal-title":"Neural Computation"},{"issue":"3","key":"103_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:DAMI.0000023673.23078.a3","volume":"8","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery\u00a08(3), 203\u2013225 (2004)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"103_CR9","unstructured":"Fyfe, C., Corchado, E.: Maximum Likelihood Hebbian Rules. In: ESANN (2002)"},{"issue":"4","key":"103_CR10","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1080\/09528130310001611603","volume":"15","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters Using Lateral Connections. JETAI\u00a015(4), 473\u2013487 (2003)","journal-title":"JETAI"},{"issue":"8","key":"103_CR11","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1142\/S0218001403002915","volume":"17","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. International Journal of Pattern Recognition and Artificial Intelligence\u00a017(8), 1447\u20131466 (2003)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"103_CR12","first-page":"350","volume":"10","author":"H.S. Seung","year":"1998","unstructured":"Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems\u00a010, 350 (1998)","journal-title":"Advances in Neural Information Processing Systems"},{"key":"103_CR13","doi-asserted-by":"crossref","unstructured":"Fyfe, C.: A Neural Network for PCA and Beyond. Neural Processing Letters\u00a06 (1996)","DOI":"10.1023\/A:1009606706736"},{"key":"103_CR14","doi-asserted-by":"crossref","unstructured":"Case, J., Fedor, M.S., Schoffstall, M.L., Davin, C.: Simple Network Management (SNMP). RFC-1157 (1990)","DOI":"10.17487\/rfc1157"},{"key":"103_CR15","unstructured":"Postel, J.: IAB Official Protocol Standards. RFC-1100 (1989)"},{"key":"103_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1142\/S0129065789000475","volume":"1","author":"E. Oja","year":"1989","unstructured":"Oja, E.: Neural Networks, Principal Components and Subspaces. International Journal of Neural Systems\u00a01, 61\u201368 (1989)","journal-title":"International Journal of Neural Systems"},{"key":"103_CR17","volume-title":"The Grid: Blueprint for a New Computing Infrastructure","author":"I. Foster","year":"1998","unstructured":"Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure, 1st edn. Morgan Kaufmann Publishers, San Francisco (1998)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11539087_103.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:13:58Z","timestamp":1605644038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11539087_103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283232","9783540318538"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11539087_103","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}