{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:05:19Z","timestamp":1725570319995},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404088"},{"type":"electronic","value":"9783540449898"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44989-2_38","type":"book-chapter","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T22:10:02Z","timestamp":1290204602000},"page":"316-324","source":"Crossref","is-referenced-by-count":9,"title":["Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Hofmann","sequence":"first","affiliation":[]},{"given":"Carsten","family":"Schmitz","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Sick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"38_CR1","series-title":"Tech. Rep.","volume-title":"Intrusion detection systems: A survey and taxonomy","author":"S. Axelsson","year":"2000","unstructured":"Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Tech. Rep. 99\u201315, Department of Computer Engineering, Chalmers University of Technology, G\u00f6teborg (2000)"},{"key":"38_CR2","volume-title":"Computer security threat monitoring and surveillance","author":"J.P. Anderson","year":"1980","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Tech. Rep., James P. Anderson Co., Fort Washington (1980)"},{"key":"38_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T.F. Lunt","year":"1993","unstructured":"Lunt, T.F.: A survey of intrusion detection techniques. Computers and Security 12 (1993) 405\u2013418","journal-title":"Computers and Security"},{"key":"38_CR4","series-title":"Lect Notes Comput Sci","volume-title":"Recent Advances in Intrusion Detection","year":"2002","unstructured":"Wespi, A., Vigna, G., Deri, L., eds.: Recent Advances in Intrusion Detection. LNCS 2516. Springer Verlag, Berlin, Heidelberg, New York (2002) (Proc. of the 5th Int. Symp. RAID 2002, Zurich)."},{"key":"38_CR5","volume-title":"Network Intrusion Detection","author":"S. Northcutt","year":"2002","unstructured":"Northcutt, S., Novak, J.: Network Intrusion Detection. 3 edn. New Riders, Indianapolis (2002)","edition":"3 edn."},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/306549.306571","volume":"42","author":"R. Durst","year":"1999","unstructured":"Durst, R., Champion, T., Witten, B., Miller, E., Spagnuolo, L.: Testing and evaluating computer intrusion detection systems. Comm. of the ACM 42 (1999) 53\u201361","journal-title":"Comm. of the ACM"},{"key":"38_CR7","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R.P. Lippmann","year":"2000","unstructured":"Lippmann, R.P., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34 (2000) 579\u2013595","journal-title":"Computer Networks"},{"key":"38_CR8","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/DISCEX.2000.821506","volume":"2","author":"R.P. Lippmann","year":"1999","unstructured":"Lippmann, R.P., Fried, D.J., Graf, I., Haines, J.W., Kendall, K.R., McClung, D., Weber, D., Webster, S.E., Wyschogrod, D., Cunningham, R.K., Zissman, M.A.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proc. of the 2000 DARPA Information Survivability Conf. and Exposition (DISCEX), Hilton Head. Vol. 2., IEEE Press (1999) 12\u201326","journal-title":"Proc. of the 2000 DARPA Information Survivability Conf. and Exposition (DISCEX), Hilton Head"},{"key":"38_CR9","series-title":"Tech. Rep.","volume-title":"Research in intrusion detection systems: A survey","author":"S. Axelsson","year":"1999","unstructured":"Axelsson, S.: Research in intrusion detection systems: A survey. Tech. Rep. 98\u201317, Department of Computer Engineering, Chalmers University of Technology, G\u00f6teborg (1999) (revised version)."},{"key":"38_CR10","doi-asserted-by":"crossref","first-page":"1708","DOI":"10.1109\/IJCNN.2002.1007775","volume":"2","author":"Z. Liu","year":"2002","unstructured":"Liu, Z., Florez, G., Bridges, S.: A comparison of input representations in neural networks: a case study in intrusion detection. In: Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002), Honolulu. Vol. 2. (2002) 1708\u20131713","journal-title":"Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002)"},{"key":"38_CR11","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"S. Lee","year":"2001","unstructured":"Lee, S., Heinbuch, D.: Training a neural-network based intrusion detector to recognize novel attacks. IEEE Tr. on Systems, Man and Cybernetics, Part A 31 (2001) 294\u2013299","journal-title":"IEEE Tr. on Systems, Man and Cybernetics"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1109\/IJCNN.2002.1007774","volume":"2","author":"S. Mukkamala","year":"2002","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002), Honolulu. Vol. 2. (2002) 1702\u20131707","journal-title":"Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002)"},{"key":"38_CR13","unstructured":"Wang, L., Yu, G., Wang, G., Wang, D.: Method of evolutionary neural network-based intrusion detection. In Zhong, Y., Cui, S., Wang, Y., eds.: Int. Conf. on Info-tech and Info-net (ICII 2001), Beijing. Vol. 5. (2001) 13\u201318"},{"key":"38_CR14","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1109\/IJCNN.1992.226942","volume":"2","author":"H. Debar","year":"1992","unstructured":"Debar, H., Dorizzi, B.: An application of a recurrent network to an intrusion detection. In: Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 1992), Baltimore. Vol. 2. (1992) 478\u2013483","journal-title":"Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 1992)"},{"key":"38_CR15","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/IJCNN.2000.861503","volume":"5","author":"J. Cannady","year":"2000","unstructured":"Cannady, J.: Applying CMAC-based online learning to intrusion detection. In: Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN 2000), Como. Vol. 5. (2000) 405\u2013410","journal-title":"Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN 2000)"},{"key":"38_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/3-540-44668-0_32","volume-title":"Artificial Neural Networks \u2014 ICANN 2001 (Proc. of the 11th Int. Conf. on Artificial Neural Networks)","author":"J. Cannady","year":"2001","unstructured":"Cannady, J., Garcia, R.C.: The application of fuzzy ARTMAP in the detection of computer network attacks. In Dorffner, G., Bischof, H., Hornik, K., eds.: Artificial Neural Networks \u2014 ICANN 2001 (Proc. of the 11th Int. Conf. on Artificial Neural Networks), Vienna. (Number 2130 in Lecture Notes in Computer Science, Springer Verlag, Berlin, Heidelberg, New York) (2001) 225\u2013230"},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/IJCNN.2000.861504","volume":"5","author":"A. Hoglund","year":"2000","unstructured":"Hoglund, A., Hatonen, K., Sorvari, A.: A computer host-based user anomaly detection system using the self-organizing map. In: Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN 2000), Como. Vol. 5. (2000) 411\u2013416","journal-title":"Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN 2000)"},{"key":"38_CR18","unstructured":"Rhodes, B.C., Mahaffey, J.A., Cannady, J.D.: Multiple self-organizing maps for intrusion detection. In: Proc. of the 23rd National Information Systems Security Conf. (NISSC 2000), Baltimore. (2000)"},{"key":"38_CR19","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/DISCEX.2001.932184","volume":"2","author":"D. Dasgupta","year":"2001","unstructured":"Dasgupta, D., Brian, H.: Mobile security agents for network traffic analysis. In: Proc. of DARPA Information Survivability Conference & Exposition II (DISCEX\u2019 01), Anaheim. Vol. 2. (2001) 332\u2013340","journal-title":"Proc. of DARPA Information Survivability Conference & Exposition II (DISCEX\u2019 01)"},{"key":"38_CR20","unstructured":"Kendall, K.: A database of computer attacks for the evaluation of intrusion detection systems. Master\u2019s thesis, MIT, Department of Electrical Engineering and Computer Science (1999)"},{"key":"38_CR21","volume-title":"Neural Networks \u2014 A Comprehensive Foundation","author":"S. Haykin","year":"1994","unstructured":"Haykin, S.: Neural Networks \u2014 A Comprehensive Foundation. Macmillan College Publishing Company, New York (1994)"},{"key":"38_CR22","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"C.M. Bishop","year":"1995","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Clarendon Press, Oxford (1995)"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Nauck, D., Kruse, R.: Nefclass \u2014 a neuro-fuzzy approach for the classification of data. In George, K.M., Carrol, J.H., Deaton, E., Oppenheim, D., Hightower, J., eds.: Applied Computing, ACM Press (1995) 461\u2013465 (Proc. of the 1995 ACM Symp. on Applied Computing, Nashville).","DOI":"10.1145\/315891.316068"},{"key":"38_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern Recognition with Fuzzy Objective Algorithms","author":"J.C. Bezdek","year":"1981","unstructured":"Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Algorithms. Plenum Press, New York (1981)"},{"key":"38_CR25","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"J.C. Dunn","year":"1973","unstructured":"Dunn, J.C.: A fuzzy relative of the ISODATA process and its use in detecting compact, well separated clusters. Journal on Cybernetics 3 (1973) 32\u201357","journal-title":"Journal on Cybernetics"},{"key":"38_CR26","unstructured":"Schmitz, C.: Regelbasierte Klassifikation von Angriffen in Rechnernetzen mit lernenden Verfahren. Master\u2019s thesis, University of Passau (2002)"},{"key":"38_CR27","unstructured":"Jin, Y., von Seelen, W., Sendhoff, B.: Extracting interpretable fuzzy rules from RBF neural networks. Internal Rep. 2000-02, Institut f\u00fcr Neuroinformatik (INF), Ruhr-Universit\u00e4t Bochum (2000)"},{"key":"38_CR28","unstructured":"Hofmann, A.: Einsatz von Soft-Computing-Verfahren zur Erkennung von Angriffen auf Rechnernetze. Master\u2019s thesis, University of Passau (2002)"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Neural Information Processing \u2014 ICANN\/ICONIP 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44989-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T10:33:29Z","timestamp":1711967609000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44989-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404088","9783540449898"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-44989-2_38","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}