{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:37:16Z","timestamp":1742989036886,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_42","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"446-459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Beta-Hebbian Learning for Visualizing Intrusions in Flows"],"prefix":"10.1007","author":[{"given":"H\u00e9ctor","family":"Quinti\u00e1n","sequence":"first","affiliation":[]},{"given":"Esteban","family":"Jove","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9-Luis","family":"Casteleiro-Roca","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2662-798X","authenticated-orcid":false,"given":"Daniel","family":"Urda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1614-9075","authenticated-orcid":false,"given":"\u00c1ngel","family":"Arroyo","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Luis","family":"Calvo-Rolle","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2444-5384","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Corchado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10472-010-9211-0","volume":"60","author":"A Berro","year":"2010","unstructured":"Berro, A., Larabi Marie-Sainte, S., Ruiz-Gazen, A.: Genetic algorithms and particle swarm optimization for exploratory projection pursuit. Ann. Math. Artif. Intell. 60, 153\u2013178 (2010)","journal-title":"Ann. Math. Artif. Intell."},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Casteleiro-Roca, J.L., G\u00f3mez-Gonz\u00e1lez, J.F., Calvo-Rolle, J.L., Jove, E., Quinti\u00e1n, H., Gonzalez\u00a0Diaz, B., Mendez\u00a0Perez, J.A.: Short-term energy demand forecast in hotels using hybrid intelligent modeling. Sensors 19(11), 2485 (2019)","DOI":"10.3390\/s19112485"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Casteleiro-Roca, J.L., Jove, E., S\u00e1nchez-Lasheras, F., M\u00e9ndez-P\u00e9rez, J.A., Calvo-Rolle, J.L., de\u00a0Cos\u00a0Juez, F.J.: Power cell SOC modelling for intelligent virtual sensor implementation. J. Sens. 2017 (2017)","DOI":"10.1155\/2017\/9640546"},{"key":"42_CR4","first-page":"1447","volume":"17","author":"E Corchado","year":"2003","unstructured":"Corchado, E., Fyfe, C.: Connectionist techniques for the identification and suppression of interfering underlying factors. IJPRAI 17, 1447\u20131466 (2003)","journal-title":"IJPRAI"},{"issue":"2","key":"42_CR5","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1016\/j.asoc.2010.07.002","volume":"11","author":"E Corchado","year":"2011","unstructured":"Corchado, E., Herrero, \u00c1.: Neural visualization of network traffic data for intrusion detection. Appl. Soft Comput. 11(2), 2042\u20132056 (2011). https:\/\/doi.org\/10.1016\/j.asoc.2010.07.002","journal-title":"Appl. Soft Comput."},{"key":"42_CR6","unstructured":"Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inform. Secur. Appl. 50, 102419 (2020). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212619305046"},{"key":"42_CR7","doi-asserted-by":"publisher","unstructured":"Gonz\u00e1lez, A., Herrero, \u00c1., Corchado, E.: Neural visualization of android malware families. In: Proceedings of the International Joint Conference SOCO\u201916-CISIS\u201916-ICEUTE\u201916, pp. 574\u2013583 (2016). https:\/\/doi.org\/10.1007\/978-3-319-47364-2_56","DOI":"10.1007\/978-3-319-47364-2_56"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016","DOI":"10.1109\/CVPR.2016.90"},{"key":"42_CR9","doi-asserted-by":"publisher","unstructured":"Herrero, \u00c1., Zurutuza, U., Corchado, E.: A neural-visualization IDS for honeynet data. Int. J. Neural Syst. 22(2) (2012). https:\/\/doi.org\/10.1142\/S0129065712500050","DOI":"10.1142\/S0129065712500050"},{"key":"42_CR10","unstructured":"Jove, E., Alaiz-Moret\u00f3n, H., Garc\u00eda-Rodr\u00edguez, I., Benavides-Cuellar, C., Casteleiro-Roca, J.L., Calvo-Rolle, J.L.: PID-ITS: An intelligent tutoring system for pid tuning learning process. In: Proceedings of the International Joint Conference SOCO\u201917-CISIS\u201917-ICEUTE\u201917 Le\u00f3n, Spain, September 6\u20138, 2017, pp. 726\u2013735. Springer (2017)"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Jove, E., Casteleiro-Roca, J.L., Quinti\u00e1n, H., M\u00e9ndez-P\u00e9rez, J.A., Calvo-Rolle, J.L.: A fault detection system based on unsupervised techniques for industrial control loops. Exp. Syst. 36(4), e12395 (2019)","DOI":"10.1111\/exsy.12395"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Jove, E., Casteleiro-Roca, J.L., Quinti\u00e1n, H., M\u00e9ndez-P\u00e9rez, J.A., Calvo-Rolle, J.L.: Anomaly detection based on intelligent techniques over a bicomponent production plant used on wind generator blades manufacturing. Revista Iberoamericana de Autom\u00e1tica e Inform\u00e1tica industrial (2020)","DOI":"10.1093\/jigpal\/jzz057"},{"key":"42_CR13","doi-asserted-by":"publisher","unstructured":"Jove, E., Casteleiro-Roca, J.L., Quinti\u00e1n, H., P\u00e9rez, J.A.M., Calvo-Rolle, J.L.: A new approach for system malfunctioning over an industrial system control loop based on unsupervised techniques. In: Proceedings of the International Joint Conference SOCO\u201918-CISIS\u201918-ICEUTE\u201918 - San Sebasti\u00e1n, Spain, June 6\u20138, 2018, pp. 415\u2013425 (2018). https:\/\/doi.org\/10.1007\/978-3-319-94120-2_40","DOI":"10.1007\/978-3-319-94120-2_40"},{"key":"42_CR14","doi-asserted-by":"publisher","unstructured":"Jove, E., Casteleiro-Roca, J.L., Quinti\u00e1n, H., P\u00e9rez, J.A.M., Calvo-Rolle, J.L.: A fault detection system based on unsupervised techniques for industrial control loops. Exp. Syst. 36(4) (2019). https:\/\/doi.org\/10.1111\/exsy.12395","DOI":"10.1111\/exsy.12395"},{"key":"42_CR15","unstructured":"Jove, E., Gonzalez-Cava, J.M., Casteleiro-Roca, J.L., P\u00e9rez, J.A.M., Calvo-Rolle, J.L., de\u00a0Cos\u00a0Juez, F.J.: An intelligent model to predict ANI in patients undergoing general anesthesia. In: Proceedings of the International Joint Conference SOCO\u201917-CISIS\u201917-ICEUTE\u201917 Le\u00f3n, Spain, September 6\u20138, 2017, pp. 492\u2013501. Springer (2017)"},{"key":"42_CR16","doi-asserted-by":"publisher","unstructured":"Luis Casteleiro-Roca, J., Quinti\u00e1n, H., Luis Calvo-Rolle, J., M\u00e9ndez-P\u00e9rez, J.A., Javier Perez-Castelo, F., Corchado, E.: Lithium iron phosphate power cell fault detection system based on hybrid intelligent system. Logic J. IGPL 28(1), 71\u201382 (2020). https:\/\/doi.org\/10.1093\/jigpal\/jzz072","DOI":"10.1093\/jigpal\/jzz072"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Mag\u00e1n-Carri\u00f3n, R., Urda, D., D\u00edaz-Cano, I., Dorronsoro, B.: Towards a reliable comparison and evaluation of network intrusion detection systems based on machine learning approaches. Appl. Sci. 10(5), 1775 (2020)","DOI":"10.3390\/app10051775"},{"issue":"2","key":"42_CR18","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s10877-016-9868-y","volume":"31","author":"A Marrero","year":"2017","unstructured":"Marrero, A., M\u00e9ndez, J., Reboso, J., Mart\u00edn, I., Calvo, J.: Adaptive fuzzy modeling of the hypnotic process in anesthesia. J. Clin. Monit. Comput. 31(2), 319\u2013330 (2017)","journal-title":"J. Clin. Monit. Comput."},{"key":"42_CR19","doi-asserted-by":"publisher","unstructured":"Moonsamy, V., Rong, J., Liu, S.: Mining permission patterns for contrasting clean and malicious android applications. Fut. Gener. Comput. Syst. 36, 122\u2013132 (2014). https:\/\/doi.org\/10.1016\/j.future.2013.09.014","DOI":"10.1016\/j.future.2013.09.014"},{"key":"42_CR20","doi-asserted-by":"publisher","unstructured":"Park, W., Lee, K., Cho, K., Ryu, W.: Analyzing and detecting method of android malware via disassembling and visualization. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 817\u2013818 (2014). https:\/\/doi.org\/10.1109\/ICTC.2014.6983300","DOI":"10.1109\/ICTC.2014.6983300"},{"key":"42_CR21","doi-asserted-by":"publisher","unstructured":"Paturi, A., Cherukuri, M., Donahue, J., Mukkamala, S.: Mobile malware visual analytics and similarities of attack toolkits (malware gene analysis). In: 2013 International Conference on Collaboration Technologies and Systems (CTS), pp. 149\u2013154 (2013). https:\/\/doi.org\/10.1109\/CTS.2013.6567221","DOI":"10.1109\/CTS.2013.6567221"},{"key":"42_CR22","doi-asserted-by":"publisher","unstructured":"Quinti\u00e1n, H., Corchado, E.: Beta hebbian learning as a new method for exploratory projection pursuit. Int. J. Neural Syst. 27(6), 1\u201316 (2017). https:\/\/doi.org\/10.1142\/S0129065717500241","DOI":"10.1142\/S0129065717500241"},{"key":"42_CR23","doi-asserted-by":"publisher","unstructured":"Ra\u00fal\u00a0S\u00e1nchez, A.H., Corchado, E.: Visualization and clustering for snmp intrusion detection. Cybern. Syst. 44(6\u20137), 505\u2013532 (2013). https:\/\/doi.org\/10.1080\/01969722.2013.803903","DOI":"10.1080\/01969722.2013.803903"},{"key":"42_CR24","doi-asserted-by":"publisher","unstructured":"S\u00e1nchez, R., Herrero, A., Corchado, E.: Clustering extension of MOVICAB-IDS to distinguish intrusions in flow-based data. Logic J. IGPL 25(1), 83\u2013102 (2016). https:\/\/doi.org\/10.1093\/jigpal\/jzw047","DOI":"10.1093\/jigpal\/jzw047"},{"key":"42_CR25","doi-asserted-by":"publisher","unstructured":"Somarriba, O., Zurutuza, U., Uribeetxeberria, R., Delosieres, L., Nadjm-Tehrani, S.: Detection and visualization of android malware behavior. J. Electric. Comput. Eng. (2016). https:\/\/doi.org\/10.1155\/2016\/8034967","DOI":"10.1155\/2016\/8034967"},{"key":"42_CR26","doi-asserted-by":"crossref","unstructured":"Sperotto, A., Sadre, R., Van\u00a0Vliet, F., Pras, A.: A labeled data set for flow-based intrusion detection. In: International Workshop on IP Operations and Management, pp. 39\u201350. Springer (2009)","DOI":"10.1007\/978-3-642-04968-2_4"},{"key":"42_CR27","doi-asserted-by":"crossref","unstructured":"Tom\u00e1s-Rodr\u00edguez, M., Santos, M.: Modelling and control of floating offshore wind turbines. Revista Iberoamericana de Autom\u00e1tica e Inform\u00e1tica Industrial 16(4) (2019)","DOI":"10.4995\/riai.2019.11648"},{"key":"42_CR28","doi-asserted-by":"crossref","unstructured":"Vega, R.V., Chamoso, P., Briones, A.G., Casteleiro-Roca, J.L., Jove, E., Meizoso-L\u00f3pez, M., Rodr\u00edguez-G\u00f3mez, B., Quinti\u00e1n, H., \u00e1lvaro Herrero, Matsui, K., Corchado, E., Calvo-Rolle, J.: Intrusion detection with unsupervised techniques for network management protocols over smart grids. Appl. Sci. 10, 2276 (2020)","DOI":"10.3390\/app10072276"},{"key":"42_CR29","doi-asserted-by":"publisher","unstructured":"Vega, R.V., Quinti\u00e1n, H., Cambra, C., Basurto, N., Herrero, \u00c1., Calvo-Rolle, J.L.: Delving into android malware families with a novel neural projection method. Complexity 2019, 6101697:1\u20136101697:10 (2019). https:\/\/doi.org\/10.1155\/2019\/6101697","DOI":"10.1155\/2019\/6101697"},{"key":"42_CR30","doi-asserted-by":"publisher","unstructured":"Vega\u00a0Vega, R., Quinti\u00e1n, H., Calvo-Rolle, J.L., Herrero, \u00c1., Corchado, E.: Gaining deep knowledge of android malware families through dimensionality reduction techniques. Logic J. IGPL (2019, In press). https:\/\/doi.org\/10.1093\/jigpal\/jzy030","DOI":"10.1093\/jigpal\/jzy030"},{"key":"42_CR31","doi-asserted-by":"publisher","unstructured":"Vega\u00a0Vega, R., Quinti\u00e1n, H., Calvo-Rolle, J.L., Herrero, A., Corchado, E.: Gaining deep knowledge of Android malware families through dimensionality reduction techniques. Logic J. IGPL 27(2), 160\u2013176 (2018). https:\/\/doi.org\/10.1093\/jigpal\/jzy030","DOI":"10.1093\/jigpal\/jzy030"},{"key":"42_CR32","doi-asserted-by":"publisher","unstructured":"Wagner, M., Fischer, F., Luh, R., Haberson, A., Rind, A., Keim, D.A., Aigner, W.: A survey of visualization systems for malware analysis. In: Eurographics Conference on Visualization (EuroVis) - STARs (2015). https:\/\/doi.org\/10.2312\/eurovisstar.20151114","DOI":"10.2312\/eurovisstar.20151114"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T11:30:11Z","timestamp":1668079811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}