{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:40:24Z","timestamp":1725892824948},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540362975"},{"type":"electronic","value":"9783540362999"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11795131_115","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T11:48:02Z","timestamp":1159271282000},"page":"792-798","source":"Crossref","is-referenced-by-count":1,"title":["FADS: A Fuzzy Anomaly Detection System"],"prefix":"10.1007","author":[{"given":"Dan","family":"Li","sequence":"first","affiliation":[]},{"given":"Kefei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jitender S.","family":"Deogun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"115_CR1","doi-asserted-by":"crossref","unstructured":"Bace, R.: Intrusion Detection. Macmillan Technical Publishing (2000)","DOI":"10.6028\/NIST.SP.800-31"},{"key":"115_CR2","unstructured":"Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001 pp. 11\u201316 (2001)"},{"key":"115_CR3","first-page":"255","volume-title":"Proc. 17th International Conf. on Machine Learning","author":"E. Eskin","year":"2000","unstructured":"Eskin, E.: Anomaly detection over noisy data using learned probability distributions. In: Proc. 17th International Conf. on Machine Learning, pp. 255\u2013262. Morgan Kaufmann, San Francisco (2000)"},{"key":"115_CR4","unstructured":"Friedman, N., Goldszmidt, M.: Building classifiers using bayesian networks. In: AAAI\/IAAI, vol.\u00a02, pp. 1277\u20131284 (1996)"},{"key":"115_CR5","volume-title":"Proceedings of the DARPA Information Survivability Conference and Exposition","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Fried, D., Graf, I., Haines, J., Kendall, K., McClung, D., Weber, D., Webster, S., Wyschogrod, D., Cunningham, R., Zissman, M.: Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"115_CR6","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X","volume":"15","author":"J. Luo","year":"2000","unstructured":"Luo, J., Bridges, S.: Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. International Journal of Intelligent Systems\u00a015, 687\u2013703 (2000)","journal-title":"International Journal of Intelligent Systems"},{"key":"115_CR7","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: ACM Workshop on Data Mining Applied to Security (2001)"},{"key":"115_CR8","unstructured":"St\u00f6rr, H.-P.: A compact fuzzy extension of the naive bayesian classification algorithm. In: Proceedings InTech\/VJFuzzy 2002, Hanoi, Vietnam, pp. 172\u2013177 (2002)"},{"key":"115_CR9","doi-asserted-by":"crossref","unstructured":"Sung, A., Mukkamala, S.: Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings of the 2003 Symposium on Applications and Internet, January 2003, pp. 209\u2013216 (2003)","DOI":"10.1109\/SAINT.2003.1183050"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11795131_115.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:10:25Z","timestamp":1605625825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11795131_115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540362975","9783540362999"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/11795131_115","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}