{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:48:05Z","timestamp":1725554885572},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344827"},{"type":"electronic","value":"9783540344834"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760191_34","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:00:36Z","timestamp":1147356036000},"page":"231-239","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion Detection Based on Fuzzy Neural Networks"],"prefix":"10.1007","author":[{"given":"Ji-yao","family":"An","sequence":"first","affiliation":[]},{"given":"Guangxue","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Ren-fa","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","first-page":"4","volume":"23","author":"B. Fang","year":"2002","unstructured":"Fang, B.: Constructing Frame of Computer Emergency Response Protecting the Cyber Security. Journal of China Institute of Commun\u00a023, 4\u20138 (2002)","journal-title":"Journal of China Institute of Commun"},{"key":"34_CR2","first-page":"1460","volume":"11","author":"J. Jiang","year":"2004","unstructured":"Jiang, J., Ma, H., Ren, D.: Net Security Intrusion Detection: A Research Summary. Journal of Software\u00a011, 1460\u20131466 (2004)","journal-title":"Journal of Software"},{"key":"34_CR3","first-page":"1235","volume":"23","author":"Z. Li","year":"2002","unstructured":"Li, Z., Li, J.: Application of Fuzzy Neural Networks to Intrusion Detection. Mini-Micro Systems\u00a023, 1235\u20131238 (2002)","journal-title":"Mini-Micro Systems"},{"doi-asserted-by":"crossref","unstructured":"Fei, Y., Li, R., Zhu, M., et al.: An Intrusion Detection System Based on FRete Net Algorithm. In: Proceedings of Fifth World Congress on Intelligent Control and Automation, vol.\u00a05, pp. 4362\u20134366 (2004)","key":"34_CR4","DOI":"10.1109\/WCICA.2004.1342337"},{"key":"34_CR5","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-31","volume-title":"Intrusion Detection","author":"R.G. Bace","year":"2001","unstructured":"Bace, R.G.: Intrusion Detection. People\u2019s Posts & Telecom Press, Beijing (2001)"},{"key":"34_CR6","first-page":"133","volume":"29","author":"Q. Li","year":"2003","unstructured":"Li, Q., Zhang, D., Sun, Z., et al.: Intrusion Detection Method Based on Fuzzy Reasoning Driven by Neural Network. Computer Engineering\u00a029, 133\u2013135 (2003)","journal-title":"Computer Engineering"},{"key":"34_CR7","first-page":"6","volume":"29","author":"M. Ouyang","year":"2003","unstructured":"Ouyang, M., Zhang, Y., Kpotchie, K., et al.: A Representing Matrix for Intrusion Signatures Based on Fuzzy Comprehensive Evaluation. Computer Engineering\u00a029, 6\u20138 (2003)","journal-title":"Computer Engineering"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760191_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:40Z","timestamp":1619507380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760191_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344827","9783540344834"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11760191_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}