{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:38:26Z","timestamp":1725496706459},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403692"},{"type":"electronic","value":"9783540449386"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44938-8_35","type":"book-chapter","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T09:38:53Z","timestamp":1196329133000},"page":"346-355","source":"Crossref","is-referenced-by-count":13,"title":["A Modular Multiple Classifier System for the Detection of Intrusions in Computer Networks"],"prefix":"10.1007","author":[{"given":"Giorgio","family":"Giacinto","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Didaci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Allen J., Christie A., Fithen W., McHugh J., Pickel J., Storner E., 2000. State of the Practice of Intrusion Detection Technologies. Tech. Rep. CMU\/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon University.","DOI":"10.21236\/ADA375846"},{"issue":"3","key":"35_CR2","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S. Axelsson","year":"2000","unstructured":"Axelsson S., 2000. The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Trans. on Information and System Security 3(3), 186\u2013205.","journal-title":"ACM Trans. on Information and System Security"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Bonifacio J.M., Cansian A.M., de Carvalho A.C.P.L.F., Moreira E.S., 1998. Neural Networks applied in intrusion detection systems. Proc. of the IEEE World congress on Comp. Intell. (WCCI\u2019 98).","DOI":"10.1109\/IJCNN.1998.682263"},{"key":"35_CR4","unstructured":"Cannady J., 2000. An adaptive neural network approach to intrusion detection and response. PhD Thesis, School of Comp. and Inf. Sci., Nova Southeastern University."},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Debar H., Becker M., Siboni D., 1992. A Neural Network Component for an Intrusion Detection System. Proc. of the IEEE Symp. on Research in Security and Privacy, Oakland, CA, USA, 240\u2013250.","DOI":"10.1109\/RISP.1992.213257"},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C. Elkan","year":"2000","unstructured":"Elkan C., 2000. Results of the KDD\u201999 Classifier Learning. ACM SIGKDD Explorations 1, 63\u201364.","journal-title":"ACM SIGKDD Explorations"},{"key":"35_CR7","unstructured":"Ghosh A.K., Schwartzbard A., 1999. A Study in Using Neural Networks for Anomaly and Misuse Detection. Proc. of the USENIX Security Symposium, August 23\u201326, 1999, Washington, USA."},{"issue":"5","key":"35_CR8","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0167-8655(00)00006-4","volume":"21","author":"G. Giacinto","year":"2001","unstructured":"Giacinto G., Roli F., Bruzzone L.,2001. Combination of Neural and Statistical Algorithms for Supervised Classification of Remote-Sensing Images. Pattern Recognition Letters, 21(5), 385\u2013397.","journal-title":"Pattern Recognition Letters"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Giacinto G., Roli F., Didaci L., 2003. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters (in press).","DOI":"10.1016\/S0167-8655(03)00004-7"},{"issue":"3","key":"35_CR10","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/34.667881","volume":"20","author":"J. Kittler","year":"1998","unstructured":"Kittler J., Hatef M., Duin R.P.W., Matas J., 1998. On Combining Classifiers. IEEE Trans. on Pattern Analysis and Machine Intelligence 20(3), 226\u2013229.","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"35_CR11","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0031-3203(99)00223-X","volume":"34","author":"L.I. Kuncheva","year":"2001","unstructured":"Kuncheva L.I., Bezdek J.C., Duin R.P.W., 2001. Decision Templates for Multiple Classifier Fusion. Pattern Recognition 34(2), 299\u2013314.","journal-title":"Pattern Recognition"},{"key":"35_CR12","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"S.C. Lee","year":"2001","unstructured":"Lee S.C., Heinbuch D.V., 2001. Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks. IEEE Trans. on Systems, Man, and Cybernetics Part A 31, 294\u2013299.","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics Part A"},{"issue":"4","key":"35_CR13","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee W., Stolfo S.J., 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. on Inform. and System Security 3(4), 227\u2013261.","journal-title":"ACM Trans. on Inform. and System Security"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"McHugh J., Christie A., Allen J., 2000. Defending Yourself: The Role of Intrusion Detection Systems. IEEE Software, Sept.\/Oct. 2000, 42\u201351.","DOI":"10.1109\/52.877859"},{"key":"35_CR15","unstructured":"Northcutt S., Cooper M., Fearnow M., Frederick K., 2001. Intrusion Signatures and Analysis. New Riders Pub."},{"key":"35_CR16","unstructured":"Northcutt S., Novak J., 2001. Network Intrusion Detection (2nd ed). New Riders Pub."},{"key":"35_CR17","unstructured":"Proctor P.E., 2001. The Practical Intrusion Detection Handbook. Prentice Hall."},{"key":"35_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-45428-4_25","volume-title":"Multiple Classifier Systems","author":"F. Roli","year":"2002","unstructured":"Roli F., Fumera G., 2002. Analysis of Linear and Order Statistics Combiners for Fusion of Imbalanced Classifiers. Multiple Classifier Systems, Roli and Kittler, Eds. Springer-Verlag, Lecture Notes in Computer Science, vol. 2364, 252\u2013261."},{"key":"35_CR19","first-page":"943","volume-title":"Advances in Neural Information Processing Systems","author":"J. Ryan","year":"1998","unstructured":"Ryan J., Lin M.J., Miikkulainen R., 1998. Intrusion Detection with Neural Networks. In: Advances in Neural Information Processing Systems 10, M. Jordan et al., Eds., Cambridge, MA: MIT Press, 943\u2013949."},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Sharkey A.J.C., 1999. Combining Artificial Neural Nets. Springer.","DOI":"10.1007\/978-1-4471-0793-4"},{"key":"35_CR21","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/21.155943","volume":"22","author":"L. Xu","year":"1992","unstructured":"Xu L., Krzyzak A., Suen C.Y., 1992. Methods for combining multiple classifiers and their applications to handwriting recognition. IEEE Trans. Systems, Man and Cybernetics 22, 418\u2013435.","journal-title":"IEEE Trans. Systems, Man and Cybernetics"},{"key":"35_CR22","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"D.-J. Yeung","year":"2003","unstructured":"Yeung D.-J., Ding Y., 2003. Host-based intrusion detection using dynamic and static behavioral models. Patter Recognition 36, 229\u2013243.","journal-title":"Patter Recognition"}],"container-title":["Lecture Notes in Computer Science","Multiple Classifier Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44938-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T08:17:17Z","timestamp":1557044237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44938-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403692","9783540449386"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-44938-8_35","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}