{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:32:50Z","timestamp":1726407170750},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-45034-3_39","type":"book-chapter","created":{"date-parts":[[2007,5,20]],"date-time":"2007-05-20T08:38:50Z","timestamp":1179650330000},"page":"385-390","source":"Crossref","is-referenced-by-count":11,"title":["A Blackboard-Based Learning Intrusion Detection System: A New Approach"],"prefix":"10.1007","author":[{"given":"Mayukh","family":"Dass","sequence":"first","affiliation":[]},{"given":"James","family":"Cannady","sequence":"additional","affiliation":[]},{"given":"Walter D.","family":"Potter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Raytheom, The Insider Threat, White Paper of SilentRunner, Inc. published in 01\/09\/02."},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Lane, T and Brodley C E, Temporal Sequence Learning and Data Reduction for Anomaly Detection, In ACM Transaction on Information and System Security, Vol. 2, No. 3, August 1999.","DOI":"10.1145\/322510.322526"},{"issue":"6","key":"39_CR3","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W. Lee","year":"2000","unstructured":"Lee, W, Stolfo S and Mok K, Adaptive Intrusion Detection: A Data Mining Approach, In Artificial Intelligence Review, Kluwer Academic Publishers, 14(6): 533\u2013567, December 2000.","journal-title":"Artificial Intelligence Review"},{"issue":"2","key":"39_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"Se-13","author":"D. E. Denning","year":"1987","unstructured":"Denning D E, An Intrusion-Detection Model, In IEEE Transaction on Software Engineering, Vol. Se-13, No. 2, February 1987, 222\u2013232.","journal-title":"IEEE Transaction on Software Engineering"},{"key":"39_CR5","unstructured":"Dasgupta D., Gonzalez F., K. Yallapu, Gomez, J., Yarramsettii, R., Dunlap, G. and Greveas, M., CIDS: An Agent-based Intrusion Detection System, In CS Technical Report No. CS-02-001., Feb, 2002."},{"key":"39_CR6","unstructured":"Balasubramaniyan, J, Fernandez J O, Isacoff D, Spafford E. and Zamboni D, An Architecture for Intrusion Detection Using Autonomous Agents, In COAST Technical Report 98\/5, Purdue University, June 1998."},{"key":"39_CR7","unstructured":"Cannady, J., Artificial Neural Network of Misuse Detection, in the Proceedings of the 1998 National Information Systems Security Conference (NISSC\u201998) October 5\u20138 1998. Arlington, VA"},{"key":"39_CR8","unstructured":"Ludovic, ME, GASSATA, a Genetic Algorithm as an Alternative Tool for Security Trails Analysis, in the Proceedings of First International Symposium of Recent Advances in Intrusion Detection, 1998."},{"key":"39_CR9","unstructured":"Anderson, D., Frivold, T. and Valdes, A Next-generation Intrusion Detection Expert System (NIDES): A Summary, SRI International Technical Report SRI-CSL-95-07, May, 1995."},{"key":"39_CR10","unstructured":"Sebring, M., Shellhouse, E., Hanna, M. and Whitehurst, R., Expert Systems in Intrusion Detection: A Case Study, In Proceedings of the 11th National Computer Security Conference. 1988."},{"key":"39_CR11","volume-title":"Computer System That Learn","author":"S. Weiss","year":"1991","unstructured":"Weiss S., Kulikowski C., Computer System That Learn, Morgan Kauffman, California, 1991."}],"container-title":["Lecture Notes in Computer Science","Developments in Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45034-3_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:08:00Z","timestamp":1605647280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45034-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540404552"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-45034-3_39","relation":{},"subject":[]}}