{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:04:11Z","timestamp":1725552251379},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540335849"},{"type":"electronic","value":"9783540335856"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11739685_69","type":"book-chapter","created":{"date-parts":[[2006,5,4]],"date-time":"2006-05-04T05:55:01Z","timestamp":1146722101000},"page":"662-671","source":"Crossref","is-referenced-by-count":6,"title":["EFIS: Evolvable-Neural-Based Fuzzy Inference System and Its Application for Adaptive Network Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Muhammad Fermi","family":"Pasha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rahmat","family":"Budiarto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad","family":"Syukur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Masashi","family":"Yamada","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"69_CR1","unstructured":"Marchette, D.: A Statistical Method for Profiling Network Traffic. In: Workshop on Intrusion Detection and Network Monitor, pp. 119\u2013128 (1999)"},{"key":"69_CR2","unstructured":"Pasha, M.F., Budiarto, R., Sumari, P., Osman, A.: Data Mining and Rule Generation in Network Traffic using Fuzzy Clustering Techniques. In: MMU International Symposium on Information and Communications Technologies, vol.\u00a0TS4B-5, pp. 17\u201320 (2004)"},{"key":"69_CR3","unstructured":"Budiarto, R., Pasha, M.F.: Developing Online Adaptive Engine for Profiling Network Traffic using Evolving Connectionist Systems. In: Conference on Neuro-Computing and Evolving Intelligence, pp. 69\u201370 (2004)"},{"key":"69_CR4","unstructured":"Lampinen, T., Koivisto, H., Honkanen, T.: Profiling Network Application with Fuzzy C-Means Clustering and Self Organizing Map. In: First International Conference on Fuzzy System and Knowledge Discovery: Computational Intelligence for the E-Age, pp. 300\u2013304 (2002)"},{"key":"69_CR5","volume-title":"Evolving Connectionist System: Methods and Applications in Bioinformatics, Brain Study and Intelligent Machines","author":"N. Kasabov","year":"2002","unstructured":"Kasabov, N.: Evolving Connectionist System: Methods and Applications in Bioinformatics, Brain Study and Intelligent Machines. Springer, Heidelberg (2002)"},{"key":"69_CR6","unstructured":"Teng, H.S., Chen, K., Lu, S.C.: Adaptive real-time anomaly detection using inductively generated sequential patterns. In: IEEE Symposium on Security and Privacy, pp. 278\u2013284 (1980)"},{"key":"69_CR7","unstructured":"Lane, T., Brodley, C.: Approaches to online learning and conceptual drift for user identification in computer security. ECE and the COAST Laboratory Tech. Rep. (Coast TR 98-12). Purdue University (1998)"},{"key":"69_CR8","unstructured":"Cannady, J.: Next generation intrusion detection: Autonomous reinforcement learning of network attacks. In: 23rd National Information Systems Security Conference, pp. 1\u201312 (2000)"},{"key":"69_CR9","unstructured":"Hossain, M., Bridges, S.M.: A framework for an adaptive intrusion detection system with data mining. In: 13th Annual Canadian Information Technology Security Symposium (2001)"},{"issue":"9","key":"69_CR10","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1016\/S0893-6080(99)00067-2","volume":"12","author":"J. Kim","year":"1999","unstructured":"Kim, J., Kasabov, N.: HyFIS: Adaptive Neuro-Fuzzy System and Their Application to Non-Linear Dynamical Systems. Neural Network\u00a012(9), 1301\u20131319 (1999)","journal-title":"Neural Network"},{"key":"69_CR11","unstructured":"Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11\u201316 (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11739685_69","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:25:00Z","timestamp":1558275900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11739685_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540335849","9783540335856"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11739685_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}