{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T09:25:13Z","timestamp":1750757113055},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344827"},{"type":"electronic","value":"9783540344834"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760191_37","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:00:36Z","timestamp":1147356036000},"page":"255-260","source":"Crossref","is-referenced-by-count":6,"title":["A Novel Intrusion Detection Model Based on Multi-layer Self-Organizing Maps and Principal Component Analysis"],"prefix":"10.1007","author":[{"given":"Jie","family":"Bai","sequence":"first","affiliation":[]},{"given":"Yu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guoyin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Simon X.","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Wenbin","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Li, Z.J., Wu, Y., Wang, G.Y.: A new framework for intrusion detection based on rough set theory. In: Proceedings of SPIE, vol.\u00a05433, pp. 122\u2013130 (2004)","DOI":"10.1117\/12.540951"},{"key":"37_CR2","unstructured":"Lin, S.C., Shi, D.H.: A Study of Intrusion Detection System Based on Anomaly Detection in Windows Environment. Master thesis, Taiwan of China (2004)"},{"key":"37_CR3","unstructured":"Lichodzijewski, P.: Dynamic Intrusion Detection Using Self Organizing Maps. In: 14th Annual Canadian Information Technology Security Symposium (2002)"},{"key":"37_CR4","series-title":"Data Mining for Security Applications","volume-title":"A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data","year":"2002","unstructured":"Eskin, E.A. (ed.): A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. Data Mining for Security Applications. Kluwer, Dordrecht (2002)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Kohonen, T.: The Self-Organizing Map. Proceedings of the IEEE\u00a078(9) (1990)","DOI":"10.1109\/5.58325"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Kayacik, H.G., Zincir Heywood, A.N., Heywood, M.I.: On Dataset Biases in a Learning System with Minimum a priori Information for Intrusion Detection. In: Proceedings of the IEEE CNSR, Fredericton, Canada, pp. 181\u2013189 (2004)","DOI":"10.1109\/DNSR.2004.1344727"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760191_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:41Z","timestamp":1619507381000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760191_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344827","9783540344834"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11760191_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}