{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:49:06Z","timestamp":1725554946237},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344827"},{"type":"electronic","value":"9783540344834"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760191_35","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:00:36Z","timestamp":1147356036000},"page":"240-245","source":"Crossref","is-referenced-by-count":12,"title":["Intrusion Detection Using PCASOM Neural Networks"],"prefix":"10.1007","author":[{"given":"Guisong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhang","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Cannady, J.: Artificial Neural Networks for Misuse Detection. In: Proceedings, National Information Systems Security Conference (NISSC 1998), Arlington VA, pp. 443\u2013456 (1998)"},{"key":"35_CR2","unstructured":"Anderson, D., Frivold, T., Valdes, A.: Next-generation Intrusion Detection Expert System(NIDES): A Summary. SRI International Technical Report, SRI-CSL-95-07"},{"key":"35_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-45248-5_3","volume-title":"Recent Advances in Intrusion Detection","author":"M. Ramadas","year":"2003","unstructured":"Ramadas, M., Ostermann, S., Tjaden, B.: Detecting Anomalous Network Traffic with Self-organizing Maps. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 36\u201354. Springer, Heidelberg (2003)"},{"key":"35_CR4","unstructured":"Ghosh, A., Schwartzbard, A.: A Study in Using Neural Networks for Anomaly and Misuse Detection. In: Proceedings of the Eighth USENIX Security Symposium, pp. 141\u2013151 (1999)"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Kuchimanchi, G.K., Phoha, V.V., Balagami, K.S., Gaddam, S.R.: Dimension Reduction Using Feature Extraction Methods for Real-time Misuse Detection Systems. In: Proceedings of the 2004 IEEE Workshop on Information Assurance and Security, pp. 195\u2013202 (2004)","DOI":"10.1109\/IAW.2004.1437817"},{"key":"35_CR6","unstructured":"Labib, K., Vemuri, V.R.: Detecting and Visualizing Denial-of-Service and Network Probe Attacks Using Principal Component Analysis. In: Third Conference on Security and Network Architectures, La Londe, France (2004)"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Lei, J.Z., Ghorbani, A.: Network Intrusion Detection Using an Improved Competitive Learning Neural Network. Second Annual Conference on Communication Networks and Services Research, 190\u2013197 (2004)","DOI":"10.1109\/DNSR.2004.1344728"},{"issue":"2","key":"35_CR8","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.neunet.2003.04.001","volume":"17","author":"E.L. Rubio","year":"2004","unstructured":"Rubio, E.L., Prez, J.M., Antonio, J., Ruiz, G.: A Principal Components Analysis Self-organizing Map. Neural Networks\u00a017(2), 261\u2013270 (2004)","journal-title":"Neural Networks"},{"key":"35_CR9","volume-title":"Neural Networks: A Comprehensive Foundation","author":"S. Haykin","year":"2001","unstructured":"Haykin, S.: Neural Networks: A Comprehensive Foundation, 2nd edn. Tsinghua University Press, Beijing (2001)","edition":"2"},{"key":"35_CR10","unstructured":"KDD Cup 1999 Data, \n                    \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"35_CR11","unstructured":"DARPA Intrusion Detection Evaluation Project, \n                    \n                      http:\/\/www.ll.mit.edu\/LST\/ideval\/"},{"key":"35_CR12","unstructured":"Pan, Z.S., Chen, S.C., Hu, G.B., Zhang, D.Q.: Hybrid Neural Network and C4.5 for Misuse Detection. In: Proceedings of the Second International Conference on Machine Learning and Cybernetics, pp. 2463\u20132467 (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760191_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:40Z","timestamp":1619507380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760191_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344827","9783540344834"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11760191_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}