{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:15:49Z","timestamp":1725560149173},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283232"},{"type":"electronic","value":"9783540318538"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11539087_16","type":"book-chapter","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T22:26:10Z","timestamp":1279664770000},"page":"139-148","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Intrusions Detection Method Based on HMM Embedded Neural Network"],"prefix":"10.1007","author":[{"given":"Weijin","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yusheng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yuhui","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"16_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B. Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network\u00a08(3), 26\u201341 (1994)","journal-title":"IEEE Network"},{"issue":"4","key":"16_CR2","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"C.L. Susan","year":"2001","unstructured":"Susan, C.L., David, V.H.: Training a neural \u2013network based intrusion detector to recognize novel attacks. IEEE Transactions on systems, man and cybernetics-part a: System and Humans\u00a031(4), 294\u2013299 (2001)","journal-title":"IEEE Transactions on systems, man and cybernetics-part a: System and Humans"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. IEEE IJCNN (May 2002)","DOI":"10.1007\/978-3-7908-1782-9_10"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Debar, H., Becke, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Manganaris: A data mining analysis of RTID alarms. Computer Networks 34(4), 571\u2013577 (2000)","DOI":"10.1016\/S1389-1286(00)00138-9"},{"key":"16_CR6","unstructured":"Tran, Q., Zhang, Q.L., Li, X.: SVM classification-based intrusion detection system. Journal of China Institute of Communications 23(5) (May 2002)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pealmutt, B.: Detecting intrusion using system calls: alternative data mode. In: IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0167-4048(03)00112-3","volume":"22","author":"S.B. Cho","year":"2003","unstructured":"Cho, S.B., Park, H.J.: Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computers and Security\u00a022(1), 45\u201355 (2003)","journal-title":"Computers and Security"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. Electronics Letters, 38(13) (June 20, 2002)","DOI":"10.1049\/el:20020467"},{"key":"16_CR10","unstructured":"Zhang, X.Q., Fan, P.Z., Zhu, Z.L.: A new anomaly detection method based on hierarchical HMM. In: PDCAT 2003, China, pp. 249\u2013252 (2003)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the Research in Security and Privacy, 1992 IEEE Computer Society Symposium, pp. 240\u2013250 (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"16_CR12","unstructured":"Dugad, R., Desai, U.B.: A tutorial on hidden Markov models, Technical Report No.: SPANN-96.1 (1996)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Fox, L.K., Henning, R.R., Jonathan, H.: A Neural network approach Towards Intrusion Detection. In: Proceeding of the 13th National Computer Security Conference (2000)","DOI":"10.1016\/S1353-4858(00)08021-1"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Gao, B., Ma, H.Y., Yang, Y.H.: HMMS based on anomaly intrusion detection method. In: Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing (November 2002)","DOI":"10.1109\/ICMLC.2002.1176779"},{"key":"16_CR15","unstructured":"Jiang, W.: Hybird Genetic algorithm research and its application in problem optimization. In: Proceedings of 2004 International Conference on Manchine Learning and Cybernetics, pp. 222\u2013227 (2004)"},{"issue":"5","key":"16_CR16","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/BF02831672","volume":"9","author":"W. Jiang","year":"2004","unstructured":"Jiang, W.: Research on Optimize Prediction Model and Algorithm about Chaotic Time Series. Wuhan University Journal of Natural Sciences\u00a09(5), 735\u2013740 (2004)","journal-title":"Wuhan University Journal of Natural Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11539087_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:14:26Z","timestamp":1605644066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11539087_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283232","9783540318538"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11539087_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}