{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:42:05Z","timestamp":1725471725157},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540472421"},{"type":"electronic","value":"9783540472438"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11902140_94","type":"book-chapter","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T13:35:29Z","timestamp":1161869729000},"page":"908-917","source":"Crossref","is-referenced-by-count":4,"title":["An Anomaly Intrusion Detection Approach Using Cellular Neural Networks"],"prefix":"10.1007","author":[{"given":"Zhongxue","family":"Yang","sequence":"first","affiliation":[]},{"given":"Adem","family":"Karahoca","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"94_CR1","first-page":"259","volume-title":"Proc. 1998 Annual Computer Security Applications Conf., ACSAC 1998","author":"A. Ghosh","year":"1998","unstructured":"Ghosh, A., Wanken, J., Charron, F.: Detecting anomalous and unknown intrusions against programs. In: Proc. 1998 Annual Computer Security Applications Conf., ACSAC 1998, December 1998, pp. 259\u2013267. IEEE Computer Soc., Los Alamitos (1998)"},{"key":"94_CR2","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance, Technical Report, James P. Anderson Company, Fort Washington, PA (April 1980)"},{"key":"94_CR3","unstructured":"Frank, J.: Artificial Intelligence and Intrusion Detection: Current and future directions. In: Proceedings of the 17th National Computer Security Conference (1994)"},{"key":"94_CR4","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/3468.594912","volume":"27","author":"P. Helman","year":"1997","unstructured":"Helman, P., Bhangoo, J.A.: Statistically base system for prioritizing information exploration under uncertainty. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans\u00a027, 449\u2013466 (1997)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans"},{"key":"94_CR5","unstructured":"Ghosh, A., Schwartzbard, A.: A study in using neural networks for anomaly and misuse detection. In: Proceedings of the Eighth USENIX Security Symposium, pp. 141\u2013152 (1999)"},{"issue":"4","key":"94_CR6","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O. Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications\u00a029(4), 713\u2013722 (2005)","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"94_CR7","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion detection model. IEEE Trans. S.E.\u00a0SE-13 (2), 222\u2013232 (1987)","journal-title":"IEEE Trans. S.E."},{"key":"94_CR8","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T. Veroerd","year":"2002","unstructured":"Veroerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer Communications\u00a025, 1356\u20131365 (2002)","journal-title":"Computer Communications"},{"key":"94_CR9","unstructured":"KDD Cup 1999 Data (1999), \n                    \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup.html"},{"key":"94_CR10","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings of international symposium on applications and the internet (SAINT 2003), pp. 209\u2013217 (2003)","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"94_CR11","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2000","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)"},{"key":"94_CR12","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/31.7600","volume":"35","author":"L.O. Chua","year":"1998","unstructured":"Chua, L.O., Yang, L.: Cellular Neural Networks: theory and application. IEEE Trans. Circuits and Systems\u00a035, 1257\u20131290 (1998)","journal-title":"IEEE Trans. Circuits and Systems"},{"key":"94_CR13","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/S0167-739X(00)00052-2","volume":"17","author":"S. Pudov","year":"2001","unstructured":"Pudov, S.: Learning of cellular neural networks. Future Generation Computer Systems\u00a017, 689\u2013697 (2001)","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"94_CR14","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.982893","volume":"1","author":"L. Fortuna","year":"2001","unstructured":"Fortuna, L., Arena, P., Balya, D., Zarandy, A.: Cellular neural networks: a paradigm for nonlinear spatio-temporal processing. Circuits and Systems Magazine\u00a01(4), 6\u201321 (2001)","journal-title":"Circuits and Systems Magazine"},{"key":"94_CR15","doi-asserted-by":"crossref","unstructured":"Guzelis, C., Karamahmut, S.: Recurrent Perceptron Learning Algorithm for Completely Stable Cellular Neural Networks. In: Proc. Third IEEE Int. Workshop on Cellular Neural Network and Applications, Rome, Italy, pp. 177\u2013182 (1994)","DOI":"10.1109\/CNNA.1994.381688"},{"key":"94_CR16","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1016\/j.cor.2004.03.019","volume":"32","author":"C. Wun-Hwa","year":"2005","unstructured":"Wun-Hwa, C., Sheng-Hsun, H., Hwang-Pin, S.: Application of SVM and ANN for intrusion detection. Computers & Operations Research\u00a032, 2617\u20132634 (2005)","journal-title":"Computers & Operations Research"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences \u2013 ISCIS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11902140_94.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:37:33Z","timestamp":1619509053000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11902140_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540472421","9783540472438"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11902140_94","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}