{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:46:31Z","timestamp":1725554791257},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344827"},{"type":"electronic","value":"9783540344834"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760191_38","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:00:36Z","timestamp":1147356036000},"page":"261-266","source":"Crossref","is-referenced-by-count":3,"title":["A Modified RBF Neural Network for Network Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Xiaotao","family":"Wei","sequence":"first","affiliation":[]},{"given":"Houkuan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Shengfeng","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","first-page":"873","volume-title":"Computer Supported Cooperative Work in Design II","author":"Z.M. Yang","year":"2006","unstructured":"Yang, Z.M., Wei, X.M., Bi, L.Y., Shi, D.P., Li, H.: An Intrusion Detection System Based in RBF Neural Network. In: Shen, W.-m., Chao, K.-M., Lin, Z., Barth\u00e8s, J.-P.A., James, A. (eds.) CSCWD 2005. LNCS, vol.\u00a03865, pp. 873\u2013875. Springer, Heidelberg (2006)"},{"key":"38_CR2","unstructured":"Jiang, J., Zhang, C.L., Kamel, M.: RBF-based Real-time Hierarchical Intrusion Detection Systems. In: Proceedings of the International Joint Conference on Neural Networks, Ore-gon, USA, pp. 1512\u20131516 (2003)"},{"key":"38_CR3","unstructured":"Wang, W., Yang, J., Muntz, R.R.: Sting: A Statistical Information Grid Approach to Spatial Data Mining. In: Proceedings of the 23rd International Conference on Very Large Data Bases, Athens, Greece, pp. 186\u2013195 (1997)"},{"key":"38_CR4","unstructured":"KDD Cup 1999 Data. Machine Learning for Intrusion Detection Project. The University of Columbia (2000), \n                    \n                      http:\/\/www.cs.columbia.edu\/ids\/ml"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760191_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:42Z","timestamp":1619507382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760191_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344827","9783540344834"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/11760191_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}