{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T05:08:16Z","timestamp":1736658496554,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540465379"},{"type":"electronic","value":"9783540465393"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11893004_56","type":"book-chapter","created":{"date-parts":[[2006,10,9]],"date-time":"2006-10-09T19:15:52Z","timestamp":1160421352000},"page":"433-441","source":"Crossref","is-referenced-by-count":8,"title":["Testing CAB-IDS Through Mutations: On the Identification of Network Scans"],"prefix":"10.1007","author":[{"given":"Emilio","family":"Corchado","sequence":"first","affiliation":[]},{"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"S\u00e1iz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","doi-asserted-by":"crossref","unstructured":"Goldring, T.: Scatter (and Other) Plots for Visualizing User Profiling Data and Network Traffic. In: ACM Workshop on Visualization and Data Mining for Computer Security, pp. 119\u2013123 (2004)","DOI":"10.1145\/1029208.1029227"},{"key":"56_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11663812_14","volume-title":"Recent Advances in Intrusion Detection","author":"C. Muelder","year":"2006","unstructured":"Muelder, C., Ma, K.-L., Bartoletti, T.: Interactive Visualization for Network and Port Scan Detection. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol.\u00a03858, pp. 265\u2013283. Springer, Heidelberg (2006)"},{"key":"56_CR3","doi-asserted-by":"crossref","unstructured":"Abdullah, K., Lee, C., Conti, G., Copeland, J.A.: Visualizing Network Data for Intrusion Detection. In: IEEE Workshop on Information Assurance and Security, pp. 100\u2013108 (2002)","DOI":"10.1109\/IAW.2005.1495940"},{"key":"56_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/11508069_25","volume-title":"Intelligent Data Engineering and Automated Learning - IDEAL 2005","author":"A. Herrero","year":"2005","unstructured":"Herrero, A., Corchado, E., S\u00e1iz, J.M.: Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model. In: Gallagher, M., Hogan, J.P., Maire, F. (eds.) IDEAL 2005. LNCS, vol.\u00a03578, pp. 187\u2013194. Springer, Heidelberg (2005)"},{"key":"56_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1007\/11550907_143","volume-title":"Artificial Neural Networks: Formal Models and Their Applications \u2013 ICANN 2005","author":"E.S. Corchado","year":"2005","unstructured":"Corchado, E.S., Herrero, \u00c1., S\u00e1iz, J.M.: Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadro\u017cny, S. (eds.) ICANN 2005. LNCS, vol.\u00a03697, pp. 905\u2013910. Springer, Heidelberg (2005)"},{"key":"56_CR6","unstructured":"Corchado, E., Herrero, A., S\u00e1iz, J.M.: A Feature Selection Agent-Based IDS. In: First European Symposium on Nature-Inspired Smart Information Systems (2005)"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Ranum, M.J.: Experiences Benchmarking Intrusion Detection Systems. NFR Security (2001)","DOI":"10.1016\/S1361-3723(01)00614-5"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Vigna, G., Robertson, W., Balzarotti, D.: Testing Network-Based Intrusion Detection Signatures Using Mutant Exploits. In: ACM Conference on Computer and Communication Security (ACM CCS), pp. 21\u201330 (2004)","DOI":"10.1145\/1030083.1030088"},{"key":"56_CR9","unstructured":"Wooldridge, M.: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence, Gerhard Weiss (1999)"},{"key":"56_CR10","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/T-C.1974.224051","volume":"23","author":"J. Friedman","year":"1974","unstructured":"Friedman, J., Tukey, J.: A Projection Pursuit Algorithm for Exploratory Data Analysis. IEEE Transaction on Computers\u00a023, 881\u2013890 (1974)","journal-title":"IEEE Transaction on Computers"},{"issue":"4","key":"56_CR11","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1162\/089976601300014394","volume":"13","author":"A. Hyv\u00e4rinen","year":"2001","unstructured":"Hyv\u00e4rinen, A.: Complexity Pursuit: Separating Interesting Components from Time Series. Neural Computation\u00a013(4), 883\u2013898 (2001)","journal-title":"Neural Computation"},{"issue":"4","key":"56_CR12","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1080\/09528130310001611603","volume":"15","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters Using Lateral Connections. Journal of Experimental and Theoretical Artificial Intelligence\u00a015(4), 473\u2013487 (2003)","journal-title":"Journal of Experimental and Theoretical Artificial Intelligence"},{"issue":"8","key":"56_CR13","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1142\/S0218001403002915","volume":"17","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. International Journal of Pattern Recognition and Artificial Intelligence\u00a017(8), 1447\u20131466 (2003)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"56_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-30103-5_16","volume-title":"Cooperative Design, Visualization, and Engineering","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., Corchado, J.M., S\u00e1iz, L., Lara, A.: Constructing a Global and Integral Model of Business Management Using a CBR System. In: Luo, Y. (ed.) CDVE 2004. LNCS, vol.\u00a03190, pp. 141\u2013147. Springer, Heidelberg (2004)"},{"key":"56_CR15","first-page":"203","volume-title":"Data Mining and Knowledge Discovery","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. In: Data Mining and Knowledge Discovery, vol.\u00a08(3), pp. 203\u2013225. Kluwer Academic Publishers, Dordrecht (2004)"},{"key":"56_CR16","unstructured":"Fyfe, C., Corchado, E.: Maximum Likelihood Hebbian Rules. In: European Symposium on Artificial Neural Networks, pp. 143\u2013148 (2002)"},{"key":"56_CR17","first-page":"350","volume":"10","author":"H.S. Seung","year":"1998","unstructured":"Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems\u00a010, 350\u2013356 (1998)","journal-title":"Advances in Neural Information Processing Systems"},{"key":"56_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1142\/S0129065789000475","volume":"1","author":"E. Oja","year":"1989","unstructured":"Oja, E.: Neural Networks, Principal Components and Subspaces. International Journal of Neural Systems\u00a01, 61\u201368 (1989)","journal-title":"International Journal of Neural Systems"},{"key":"56_CR19","doi-asserted-by":"crossref","unstructured":"H\u00e4t\u00f6nen, K., H\u00f6glund, A., Sorvari, A.: A Computer Host-Based User Anomaly Detection System Using the Self-Organizing Map. In: International Joint Conference of Neural Networks, pp. 411\u2013416 (2000)","DOI":"10.1109\/IJCNN.2000.861504"},{"key":"56_CR20","doi-asserted-by":"crossref","unstructured":"Zanero, S., Savaresi, S.M.: Unsupervised Learning Techniques for an Intrusion Detection System. In: ACM Symposium on Applied Computing, pp. 412\u2013419 (2004)","DOI":"10.1145\/967900.967988"},{"key":"56_CR21","unstructured":"Marty, R.: Thor: A Tool to Test Intrusion Detection Systems by Variations of Attacks. ETH Zurich. Diploma Thesis (2002)"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11893004_56.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T09:44:34Z","timestamp":1736588674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11893004_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465379","9783540465393"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11893004_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}