{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:34Z","timestamp":1725902914798},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319627007"},{"type":"electronic","value":"9783319627014"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62701-4_22","type":"book-chapter","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T04:18:59Z","timestamp":1498796339000},"page":"278-285","source":"Crossref","is-referenced-by-count":4,"title":["Classification of Network Traffic Using Fuzzy Clustering for Network Security"],"prefix":"10.1007","author":[{"given":"Terrence P.","family":"Fries","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,1]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1016\/j.patcog.2003.09.011","volume":"37","author":"Y Liu","year":"2004","unstructured":"Liu, Y., Chen, K., Liao, X., Zhang, W.: A genetic clustering method for intrusion detection. Pattern Recognition 37, 927\u2013942 (2004)","journal-title":"Pattern Recognition"},{"key":"22_CR2","doi-asserted-by":"crossref","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T Verwoerd","year":"2002","unstructured":"Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer Communications 25, 1356\u20131365 (2002)","journal-title":"Computer Communications"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Fessi, B.A., BenAbdallah, S., Djemaiel, Y., Boudriga, N.: A clustering data fusion method for intrusion detection system. In: Proc. 11th IEEE Intl. Conf. on Computer and Information Technology, pp. 539\u2013545. IEEE Press (2011)","DOI":"10.1109\/CIT.2011.92"},{"key":"22_CR4","unstructured":"Gharehchopogh, F. S., Jabbai, N., Azar, Z. G.: Evaluation of fuzzy k-means and k-means clustering algorithms in intrusion detection systems. Intl. J. of Scientific & Technology Research 1, pp. 66\u201372 (2012)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, W., Yao, M.,Yan, J. : Intrusion detection based on improved fuzzy c-means algorithm. In: Proc. 2008 Intl. Symp. Information Science and Engineering, pp. 326\u2013329 (2008)","DOI":"10.1109\/ISISE.2008.17"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Ghadiri, A., Ghadiri, N.: An adaptive hybrid architecture for intrusion detection based on fuzzy clustering and RBF neural networks. In: Proc. Ninth Annual Communication Networks and Services Research Conf., pp. 123\u2013129 (2011)","DOI":"10.1109\/CNSR.2011.26"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Wu, J., Feng, G.: Intrusion detection based on simulated annealing and fuzzy c-means clustering. In: Proc. 2009 Intl. Conf. on Multimedia Information Networking and Security, pp. 382\u2013385. IEEE Press (2009)","DOI":"10.1109\/MINES.2009.46"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Ensafi, R., Dehghanzadeh, S., Akbarzadeh, M.: Optimizing fuzzy k-means for network anomaly detection using PSO. In: Proc. IEEE\/ACS Intl. Conf. on Computer Systems and Applications (AICCSA 2008), pp. 686-693. IEEE Press (2008)","DOI":"10.1109\/AICCSA.2008.4493603"},{"key":"22_CR9","unstructured":"University of California, Irvine, KDD99 Cup 1999 Dataset (1999). \nhttp:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"22_CR10","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"JC Dunn","year":"1973","unstructured":"Dunn, J.C.: A fuzzy relative of the Isodata process and its use in detecting compact well-separated clusters. J. Cybernetics 3, 32\u201357 (1973)","journal-title":"J. Cybernetics"},{"key":"22_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern Recognition with Fuzzy Objective Function Algorithms","author":"JC Bezdek","year":"1981","unstructured":"Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum Press, New York (1981)"},{"key":"22_CR12","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0098-3004(84)90020-7","volume":"10","author":"JC Bezdek","year":"1984","unstructured":"Bezdek, J.C., Ehrlich, R., Full, W.: FCM: The fuzzy c-means clustering algorithm. Computers & Geosciences 10, 191\u2013203 (1984)","journal-title":"Computers & Geosciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62701-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T04:25:42Z","timestamp":1498796742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62701-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319627007","9783319627014"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62701-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}