{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:10:14Z","timestamp":1736295014626,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540332060"},{"type":"electronic","value":"9783540332077"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11731139_70","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T04:03:44Z","timestamp":1141877024000},"page":"603-610","source":"Crossref","is-referenced-by-count":3,"title":["An Adaptive Intrusion Detection Algorithm Based on Clustering and Kernel-Method"],"prefix":"10.1007","author":[{"given":"Hansung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yongwha","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Daihee","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","unstructured":"Lee, W., Stolfo, S., Mok, K.: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"},{"key":"70_CR2","unstructured":"Hu, W., Liao, Y., Vemuri, V.: Robust Support Vector Machines for Anomaly Detection in Computer Security. In: Proceedings of the International Conference on Machine Learning and Applications, pp. 168\u2013174 (2003)"},{"key":"70_CR3","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion Detection with Unlabeled Data using Clustering. In: Proceedings of the ACM Workshop on Data Mining Applied to Security (2001)"},{"key":"70_CR4","unstructured":"Ye, N., Li, X.: A Scalable Clustering Technique for Intrusion Signature Recognition. In: Proceedings of the IEEE Man, Systems and Cybernetics Information Assurance Workshop (2001)"},{"issue":"5","key":"70_CR5","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.patcog.2003.09.011","volume":"37","author":"Y. Liu","year":"2004","unstructured":"Liu, Y., Chen, K., Liao, X., Zhang, W.: A Genetic Clustering Method for Intrusion Detection. Pattern Recognition\u00a037(5), 927\u2013942 (2004)","journal-title":"Pattern Recognition"},{"key":"70_CR6","unstructured":"Dhillon, I., Modha, D.: \u2018Concept Decomposition for Large Sparse Text Data using Clustering\u2019, Technical Report RJ 10147(95022), IBM Almaden Research Center (1999)"},{"issue":"3","key":"70_CR7","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/TNN.2002.1000150","volume":"13","author":"M. Girolami","year":"2002","unstructured":"Girolami, M.: Mercer Kernel-based Clustering in Feature Space. IEEE Transaction on Neural Networks\u00a013(3), 780\u2013784 (2002)","journal-title":"IEEE Transaction on Neural Networks"},{"key":"70_CR8","unstructured":"Baraldi, A., Chang, E.: Simplified ART: A New Class of ART Algorithms, International Computer Science Institute, TR 98-004 (1998)"},{"key":"70_CR9","unstructured":"KDD Cup 1999 Data (1999), Available in, http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"70_CR10","unstructured":"Results of the KDD1999, Classifier Learning Contest (1999), Available in, http:\/\/wwwcse.ucsd.edu\/users\/elkan\/clresults.html."},{"key":"70_CR11","doi-asserted-by":"crossref","unstructured":"Kayacik, H., Zincir-Heywood, A., Heywood, M.: On the capability of anSOM based intrusion detection system. In: Proceedings of the International Joint Conference on Neural Networks, vol.\u00a03, pp. 1808\u20131813 (2003)","DOI":"10.1109\/IJCNN.2003.1223682"},{"key":"70_CR12","doi-asserted-by":"crossref","unstructured":"Ambwani, T.: Multi class support vector machine implementation to intrusion detection. In: Proceedings of the International Joint Conference on Neural Networks, vol.\u00a03, pp. 2300\u20132305 (2003)","DOI":"10.1109\/IJCNN.2003.1223770"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11731139_70.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:33:48Z","timestamp":1736292828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11731139_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540332060","9783540332077"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11731139_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}