{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:40:28Z","timestamp":1736556028103,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540454854"},{"type":"electronic","value":"9783540454878"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11875581_169","type":"book-chapter","created":{"date-parts":[[2006,9,25]],"date-time":"2006-09-25T12:23:29Z","timestamp":1159187009000},"page":"1424-1433","source":"Crossref","is-referenced-by-count":12,"title":["MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"\u00c1lvaro","family":"Herrero","sequence":"first","affiliation":[]},{"given":"Emilio","family":"Corchado","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"S\u00e1iz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"169_CR1","unstructured":"Abraham, A., Grosan, C., Martin-Vide, C.: Evolutionary Design of Intrusion Detection Programs. International Journal of Network Security (2006)"},{"key":"169_CR2","doi-asserted-by":"crossref","unstructured":"Julisch, K.: Data Mining for Intrusion Detection: A Critical Review. Research Report RZ 3398, IBM Zurich Research Laboratory. Switzerland (2002)","DOI":"10.1007\/978-1-4615-0953-0_2"},{"key":"169_CR3","first-page":"227","volume-title":"ACM Transactions on Information and System Security (TISSEC)","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. In: ACM Transactions on Information and System Security (TISSEC) 3(4)227\u2013261 (2000)","edition":"3"},{"key":"169_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1007\/11539087_103","volume-title":"Advances in Natural Computation","author":"A. Herrero","year":"2005","unstructured":"Herrero, A., Corchado, E., S\u00e1iz, J.M.: A Cooperative Unsupervised Connectionist Model Applied to Identify Anomalous Massive SNMP Data Sending. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, vol.\u00a03610, pp. 778\u2013782. Springer, Heidelberg (2005)"},{"key":"169_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1007\/11550907_143","volume-title":"Artificial Neural Networks: Formal Models and Their Applications \u2013 ICANN 2005","author":"E. Corchado","year":"2005","unstructured":"Corchado, E., Herrero, A., S\u00e1iz, J.M.: Detecting Compounded Anomalous SNMP Situations Using Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadro\u017cny, S. (eds.) ICANN 2005. LNCS, vol.\u00a03697, pp. 905\u2013910. Springer, Heidelberg (2005)"},{"key":"169_CR6","doi-asserted-by":"crossref","unstructured":"Zanero, S., Savaresi, S.M.: Unsupervised Learning Techniques for an Intrusion Detection System. In: Proceedings of the ACM Symposium on Applied Computing, pp. 412\u2013419 (2004)","DOI":"10.1145\/967900.967988"},{"key":"169_CR7","volume-title":"Information Science and Statistics","author":"D.J. Marchette","year":"2001","unstructured":"Marchette, D.J.: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint. In: Information Science and Statistics. Springer, Heidelberg (2001)"},{"key":"169_CR8","unstructured":"Roesch, M.: Snort - Lightweight Intrusion Detection for Networks. In: Proceedings of the 13th Systems Administration Conference, LISA 1999 (1999)"},{"key":"169_CR9","doi-asserted-by":"crossref","unstructured":"Goldring, T.: Scatter (and Other) Plots for Visualizing User Profiling Data and Network Traffic. In: Proceedings of the ACM Workshop on Visualization and Data Mining for Computer Security (2004)","DOI":"10.1145\/1029208.1029227"},{"key":"169_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11663812_14","volume-title":"Recent Advances in Intrusion Detection","author":"C. Muelder","year":"2006","unstructured":"Muelder, C., Ma, K.-L., Bartoletti, T.: Interactive Visualization for Network and Port Scan Detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 265\u2013283. Springer, Heidelberg (2006)"},{"key":"169_CR11","doi-asserted-by":"crossref","unstructured":"Abdullah, K., Lee, C., Conti, G., Copeland, J.A.: Visualizing Network Data for Intrusion Detection. In: Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 100\u2013108 (2002)","DOI":"10.1109\/IAW.2005.1495940"},{"key":"169_CR12","unstructured":"MRTG: The Multi Router Traffic Grapher, http:\/\/people.ee.ethz.ch\/~oetiker\/webtools\/mrtg\/"},{"key":"169_CR13","unstructured":"Wooldridge, M.: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. Gerhard Weiss (1999)"},{"issue":"4","key":"169_CR14","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1080\/09528130310001611603","volume":"15","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters Using Lateral Connections. Journal of Experimental and Theoretical Artificial Intelligence\u00a015(4), 473\u2013487 (2003)","journal-title":"Journal of Experimental and Theoretical Artificial Intelligence"},{"issue":"8","key":"169_CR15","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1142\/S0218001403002915","volume":"17","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. International Journal of Pattern Recognition and Artificial Intelligence\u00a017(8), 1447\u20131466 (2003)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"169_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-30103-5_16","volume-title":"Cooperative Design, Visualization, and Engineering","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., Corchado, J.M., S\u00e1iz, L., Lara, A.: Constructing a Global and Integral Model of Business Management Using a CBR System. In: Luo, Y. (ed.) CDVE 2004. LNCS, vol.\u00a03190, pp. 141\u2013147. Springer, Heidelberg (2004)"},{"key":"169_CR17","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/T-C.1974.224051","volume":"23","author":"J. Friedman","year":"1974","unstructured":"Friedman, J., Tukey, J.: A Projection Pursuit Algorithm for Exploratory Data Analysis. IEEE Transaction on Computers\u00a023, 881\u2013890 (1974)","journal-title":"IEEE Transaction on Computers"},{"issue":"4","key":"169_CR18","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1162\/089976601300014394","volume":"13","author":"A. Hyv\u00e4rinen","year":"2001","unstructured":"Hyv\u00e4rinen, A.: Complexity Pursuit: Separating Interesting Components from Time Series. Neural Computation\u00a013(4), 883\u2013898 (2001)","journal-title":"Neural Computation"},{"issue":"3","key":"169_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:DAMI.0000023673.23078.a3","volume":"8","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery\u00a08(3), 203\u2013225 (2004)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"169_CR20","unstructured":"Fyfe, C., Corchado, E.: Maximum Likelihood Hebbian Rules. In: Proceedings of the European Symposium on Artificial Neural Networks, pp. 143\u2013148 (2002)"},{"key":"169_CR21","first-page":"350","volume":"10","author":"H.S. Seung","year":"1998","unstructured":"Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems\u00a010, 350\u2013356 (1998)","journal-title":"Advances in Neural Information Processing Systems"},{"key":"169_CR22","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1030083.1030086","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"H. Dreger","year":"2004","unstructured":"Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational Experiences with High-Volume Network Intrusion Detection. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2\u201311. ACM Press, New York (2004)"},{"key":"169_CR23","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1142\/S0129065789000475","volume":"1","author":"E. Oja","year":"1989","unstructured":"Oja, E.: Neural Networks, Principal Components and Subspaces. International Journal of Neural Systems\u00a01, 61\u201368 (1989)","journal-title":"International Journal of Neural Systems"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11875581_169.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:02:11Z","timestamp":1736553731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11875581_169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540454854","9783540454878"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11875581_169","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}