{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T04:25:37Z","timestamp":1744431937570,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_12","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T07:35:53Z","timestamp":1501918553000},"page":"143-157","source":"Crossref","is-referenced-by-count":4,"title":["Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Branitskiy","sequence":"first","affiliation":[]},{"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"12_CR1","first-page":"672","volume-title":"Computer Networks and Internets","author":"DE Comer","year":"2014","unstructured":"Comer, D.E.: Computer Networks and Internets, 6th edn, p. 672. Upper Saddle River, Pearson (2014)","edition":"6"},{"issue":"6","key":"12_CR2","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1134\/S1019331614060033","volume":"84","author":"IV Kotenko","year":"2014","unstructured":"Kotenko, I.V., Saenko, I.B.: Creating new generation cybersecurity monitoring and management systems. Herald Russ. Acad. Sci. 84(6), 993\u20131001 (2014)","journal-title":"Herald Russ. Acad. Sci."},{"key":"12_CR3","unstructured":"Branitskiy, A., Kotenko, I.: Hybridization of computational intelligence methods for attack detection in computer networks. J. Comput. Sci. Elsevier (2016). http:\/\/www.sciencedirect.com\/science\/journal\/aip\/18777503 . Accessed 1 Aug 2016"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Branitskiy, A., Kotenko, I.: Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. In: 18th IEEE International Conference on Computational Science and Engineering (IEEE CSE2015), pp. 152\u2013159. Porto, Portugal (2015)","DOI":"10.1109\/CSE.2015.26"},{"issue":"4","key":"12_CR5","first-page":"293","volume":"1","author":"M Amini","year":"2015","unstructured":"Amini, M., Rezaeenour, J., Hadavandi, E.: Effective intrusion detection with a neural network ensemble using fuzzy clustering and stacking combination method. J. Comput. Secur. 1(4), 293\u2013305 (2015)","journal-title":"J. Comput. Secur."},{"issue":"9","key":"12_CR6","doi-asserted-by":"crossref","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Chandrasekhar, A.M., Raghuveer, K.: Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers. In: International Conference on Computer Communication and Informatics (ICCCI), pp. 1\u20137 (2013)","DOI":"10.1109\/ICCCI.2013.6466310"},{"key":"12_CR8","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.neucom.2015.04.101","volume":"172","author":"A Saied","year":"2016","unstructured":"Saied, A., Overill, R.E., Radzik, T.: Detection of known and unknown DDOS attacks using artificial neural networks. Neurocomputing 172, 385\u2013393 (2016)","journal-title":"Neurocomputing"},{"key":"12_CR9","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1016\/j.protcy.2012.10.121","volume":"6","author":"B Agarwal","year":"2012","unstructured":"Agarwal, B., Mittal, N.: Hybrid approach for detection of anomaly network traffic using data mining techniques. Procedia Technol. 6, 996\u20131003 (2012)","journal-title":"Procedia Technol."},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/11538356_45","volume-title":"Advances in Intelligent Computing","author":"H-T He","year":"2005","unstructured":"He, H.-T., Luo, X.-N., Liu, B.-L.: Detecting anomalous network traffic with combined fuzzy-based approaches. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005. LNCS, vol. 3645, pp. 433\u2013442. Springer, Heidelberg (2005). doi: 10.1007\/11538356_45"},{"key":"12_CR11","first-page":"906","volume-title":"Neural Networks and Learning Machines","author":"S Haykin","year":"2009","unstructured":"Haykin, S.: Neural Networks and Learning Machines, 3rd edn, p. 906. Pearson Prentice Hall, New York (2009)","edition":"3"},{"key":"12_CR12","first-page":"461","volume-title":"Fundamentals of Neural Networks: Architectures, Algorithms and Applications","author":"L Fausett","year":"1994","unstructured":"Fausett, L.: Fundamentals of Neural Networks: Architectures, Algorithms and Applications, 1st edn, p. 461. Pearson Prentice Hall, New York (1994)","edition":"1"},{"issue":"1","key":"12_CR13","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"SMC-15","author":"T Takagi","year":"1985","unstructured":"Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. SMC-15(1), 116\u2013132 (1985)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"3","key":"12_CR14","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1109\/21.256541","volume":"23","author":"J-SR Jang","year":"1993","unstructured":"Jang, J.-S.R.: ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans. Syst. Man Cybern. 23(3), 665\u2013685 (1993)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"12_CR15","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"VN Vapnik","year":"1995","unstructured":"Vapnik, V.N.: The Nature of Statistical Learning Theory, p. 188. Springer, New York (1995)"},{"key":"12_CR16","first-page":"680","volume-title":"Pattern Classification","author":"RO Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn, p. 680. Wiley, New York (2000)","edition":"2"},{"issue":"2","key":"12_CR17","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"CW Hsu","year":"2002","unstructured":"Hsu, C.W., Lin, C.J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415\u2013425 (2002)","journal-title":"IEEE Trans. Neural Netw."},{"key":"12_CR18","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods: Foundations and Algorithms","author":"ZH Zhou","year":"2012","unstructured":"Zhou, Z.H.: Ensemble Methods: Foundations and Algorithms, p. 218. CRC Press, Boca Raton (2012)"},{"key":"12_CR19","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1002\/9781118914564","volume-title":"Combining Pattern Classifiers: Methods and Algorithms","author":"LI Kuncheva","year":"2014","unstructured":"Kuncheva, L.I.: Combining Pattern Classifiers: Methods and Algorithms, 2nd edn, p. 384. Wiley, New York (2014)","edition":"2"},{"issue":"6","key":"12_CR20","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333\u2013340 (1975)","journal-title":"Commun. ACM"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Aho, A.V.: Algorithms for finding patterns in strings. In: Handbook of Theoretical Computer Science, pp. 255\u2013300. Elsevier Science Publishers (1990)","DOI":"10.1016\/B978-0-444-88071-0.50010-2"},{"key":"12_CR22","first-page":"256","volume-title":"String Searching Algorithms","author":"GA Stephen","year":"2000","unstructured":"Stephen, G.A.: String Searching Algorithms, p. 256. World Scientific, Singapore (2000)"},{"issue":"10","key":"12_CR23","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"RS Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Commun. ACM 20(10), 762\u2013772 (1977)","journal-title":"Commun. ACM"},{"issue":"11","key":"12_CR24","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson, K.: On lines and planes of closest fit to systems of points in space. London Edinburgh Dublin Philos. Magaz. J. Sci. 2(11), 559\u2013572 (1901)","journal-title":"London Edinburgh Dublin Philos. Magaz. J. Sci."},{"key":"12_CR25","first-page":"488","volume-title":"Principal Component Analysis","author":"IT Jolliffe","year":"2002","unstructured":"Jolliffe, I.T.: Principal Component Analysis, 2nd edn, p. 488. Springer, New York (2002)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:44:33Z","timestamp":1719362673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}