{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:09:32Z","timestamp":1742972972648,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540287551"},{"type":"electronic","value":"9783540287568"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11550907_143","type":"book-chapter","created":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T16:24:41Z","timestamp":1613147081000},"page":"905-910","source":"Crossref","is-referenced-by-count":12,"title":["Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition"],"prefix":"10.1007","author":[{"given":"Emilio","family":"Corchado","sequence":"first","affiliation":[]},{"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"S\u00e1iz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"143_CR1","unstructured":"Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: IEEE Symposium on Research in Computer Security and Privacy (1992)"},{"key":"143_CR2","series-title":"Springer Computer Science","volume-title":"International Conference on Adaptive and Natural Computing Algorithms","author":"E. Corchado","year":"2005","unstructured":"Corchado, E., Herrero, A., Baruque, B., S\u00e1iz, J.M.: Intrusion Detection System Based on a Cooperative Topology Preserving Method. In: International Conference on Adaptive and Natural Computing Algorithms. Springer Computer Science. Springer, NewYork (2005)"},{"key":"143_CR3","doi-asserted-by":"crossref","unstructured":"H\u00e4t\u00f6nen, K., H\u00f6glund, A., Sorvari, A.: A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. In: International Joint Conference of Neural Networks (2000)","DOI":"10.1109\/IJCNN.2000.861504"},{"key":"143_CR4","doi-asserted-by":"crossref","unstructured":"Zanero, S., Savaresi, S.M.: Unsupervised Learning Techniques for an Intrusion Detection System. In: ACM Symposium on Applied Computing, pp. 412\u2013419 (2004)","DOI":"10.1145\/967900.967988"},{"key":"143_CR5","unstructured":"Ghosh, A., Schwartzbard, A., Schatz, A.: Learning Program Behavior Profiles for Intrusion Detection. In: Workshop on Intrusion Detection and Network Monitoring (1999)"},{"key":"143_CR6","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/T-C.1974.224051","volume":"23","author":"J. Friedman","year":"1974","unstructured":"Friedman, J., Tukey, J.: A Projection Pursuit Algorithm for Exploratory Data Analysis. IEEE Transaction on Computers\u00a023, 881\u2013890 (1974)","journal-title":"IEEE Transaction on Computers"},{"key":"143_CR7","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1162\/089976601300014394","volume":"13","author":"A. Hyv\u00e4rinen","year":"2001","unstructured":"Hyv\u00e4rinen, A.: Complexity Pursuit: Separating Interesting Components from Time Series. Neural Computation\u00a013, 883\u2013898 (2001)","journal-title":"Neural Computation"},{"key":"143_CR8","first-page":"203","volume-title":"Data Mining and Knowledge Discovery","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. In: Data Mining and Knowledge Discovery, vol.\u00a08(3), pp. 203\u2013225. Kluwer Academic Publishing, Dordrecht (2004)"},{"key":"143_CR9","unstructured":"Fyfe, C., Corchado, E.: Maximum Likelihood Hebbian Rules. In: European Symposium on Artificial Neural Networks (2002)"},{"issue":"4","key":"143_CR10","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1080\/09528130310001611603","volume":"15","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters using Lateral Connections. Journal of Experimental and Theoretical Artificial Intelligence\u00a015(4), 473\u2013487 (2003)","journal-title":"Journal of Experimental and Theoretical Artificial Intelligence"},{"issue":"8","key":"143_CR11","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1142\/S0218001403002915","volume":"17","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. International Journal of Pattern Recognition and Artificial Intelligence\u00a017(8), 1447\u20131466 (2003)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"143_CR12","doi-asserted-by":"crossref","unstructured":"Corchado, E., Corchado, J.M., S\u00e1iz, L., Lara, A.: Constructing a Global and Integral Model of Business Management Using a CBR System. In: 1st International Conference on Cooperative Design, Visualization and Engineering (2004)","DOI":"10.1007\/978-3-540-30103-5_16"},{"key":"143_CR13","doi-asserted-by":"crossref","unstructured":"Herrero, A., Corchado, E., S\u00e1iz, J.M.: A Cooperative Unsupervised Connectionist Model Applied to Identify Anomalous Massive SNMP Data Sending. In: 1st International Conference on Natural Computation (2005) (in press)","DOI":"10.1007\/11539087_103"},{"key":"143_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/11508069_25","volume-title":"Intelligent Data Engineering and Automated Learning - IDEAL 2005","author":"A. Herrero","year":"2005","unstructured":"Herrero, A., Corchado, E., S\u00e1iz, J.M.: Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model. In: Gallagher, M., Hogan, J.P., Maire, F. (eds.) IDEAL 2005. LNCS, vol.\u00a03578, pp. 187\u2013194. Springer, Heidelberg (2005) (in press)"},{"key":"143_CR15","first-page":"350","volume":"10","author":"H.S. Seung","year":"1998","unstructured":"Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems\u00a010, 350\u2013356 (1998)","journal-title":"Advances in Neural Information Processing Systems"},{"key":"143_CR16","doi-asserted-by":"crossref","unstructured":"Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. International Journal of Network Management\u00a012 (2002)","DOI":"10.1002\/nem.433"},{"key":"143_CR17","unstructured":"Cisco Secure Consulting: Vulnerability Statistics Report (2000)"},{"key":"143_CR18","doi-asserted-by":"crossref","unstructured":"Case, J., Fedor, M.S., Schoffstall, M.L., Davin, C.: Simple Network Management (SNMP). RFC-1157 (1990)","DOI":"10.17487\/rfc1157"},{"key":"143_CR19","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1142\/S0129065789000475","volume":"1","author":"E. Oja","year":"1989","unstructured":"Oja, E.: Neural Networks, Principal Components and Subspaces. International Journal of Neural Systems\u00a01, 61\u201368 (1989)","journal-title":"International Journal of Neural Systems"},{"key":"143_CR20","doi-asserted-by":"crossref","unstructured":"Aldwairi, M., Conte, T., Franzon, P.: Configurable string matching hardware for speeding up intrusion detection. In: ACM SIGARCH Computer Architecture News, vol. 33(1) (2005)","DOI":"10.1145\/1055626.1055640"},{"key":"143_CR21","volume-title":"The Grid: Blueprint for a New Computing Infrastructure","author":"I. Foster","year":"1998","unstructured":"Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure, 1st edn. Morgan Kaufmann Publishers, San Francisco (1998)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks: Formal Models and Their Applications \u2013 ICANN 2005"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11550907_143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T16:58:49Z","timestamp":1613149129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11550907_143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287551","9783540287568"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11550907_143","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}