{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:09Z","timestamp":1725564909193},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221159"},{"type":"electronic","value":"9783540246879"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24687-9_27","type":"book-chapter","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T17:01:09Z","timestamp":1283965269000},"page":"212-219","source":"Crossref","is-referenced-by-count":2,"title":["Intrusion Detection Based on Feature Transform Using Neural Network"],"prefix":"10.1007","author":[{"given":"Wonil","family":"Kim","sequence":"first","affiliation":[]},{"given":"Se-Chang","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Kyoungro","family":"Yoon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Lunt, A., Tamaru, A., Gilham, F.: IDES: A Progress Report. In: Proceedings of the 6th Annual Computer Security Applications Conference, Tucson, AZ (1990)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Denning, D.: An Intrusion Detection Model. In: Proceedings of the Seventh IEEE Symposium on Security and Privacy, pp. 119\u2013131 (1986)","DOI":"10.1109\/SP.1986.10010"},{"key":"27_CR3","unstructured":"Ye, N.A.: Markov chain model of temporal behavior for anomaly detection. In: Proceedings of the 2000 IEEE Systems, Man, and Cybernetics; Information Assurance and Security Workshop (2000)"},{"key":"27_CR4","unstructured":"Eskin, E., Lee, W., Stolfo, S.J.: Modeling system calls for intrusion detection with dynamic window sizes. In: Proceedings of DARPA Information Survivability Conference and Exposition II, DISCEX II (2001)"},{"key":"27_CR5","unstructured":"Lee, W., Stolfo, S.J., Mok, K.: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of 1999 IEEE Symposium on Security and Privacy (1999)"},{"key":"27_CR6","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security, DMSA 2001 (2001)"},{"key":"27_CR7","volume-title":"Data Mining for Security Applications","author":"E. Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. In: Data Mining for Security Applications, Kluwer, Dordrecht (2002)"},{"key":"27_CR8","first-page":"247","volume-title":"Pattern Classification and Scene Analysis","author":"R.O. Dura","year":"1973","unstructured":"Dura, R.O., Hart, P.E.: Pattern Classification and Scene Analysis, p. 247. Wiley-Interscience Publication, Hoboken (1973)"},{"key":"27_CR9","volume-title":"Computer and Information Sciences II","author":"J. Tou","year":"1967","unstructured":"Tou, J., Heydorn, R.: Some Approaches to Optimum Feature Extraction. In: Computer and Information Sciences II, Academic Press, New York (1967)"},{"key":"27_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2851-4","volume-title":"Independent Component Analysis: Theory and Applications","author":"T.-W. Lee","year":"1998","unstructured":"Lee, T.-W.: Independent Component Analysis: Theory and Applications. Kluwer Academic Publishers, Dordrecht (1998)"},{"key":"27_CR11","volume-title":"Proceedings of the 5th Berkeley Symposium on Probability and Statistics","author":"J. MacQueen","year":"1967","unstructured":"MacQueen, J.: Some Methods for Classification and Analysis of Multivariate Data. In: Proceedings of the 5th Berkeley Symposium on Probability and Statistics, University of California Press, Berkeley (1967)"},{"key":"27_CR12","unstructured":"The third international knowledge discovery and data mining tools competition dataset KDD99-Cup (1999), Available at \n                    \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"27_CR13","volume-title":"Elements of Artificial Neural Networks","author":"K. Mehrotra","year":"1997","unstructured":"Mehrotra, K., Mohan, C.K., Ranka, S.: Elements of Artificial Neural Networks. MIT Press, Cambridge (1997)"},{"key":"27_CR14","unstructured":"Paxon, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX (1998)"}],"container-title":["Lecture Notes in Computer Science","Computational Science - ICCS 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24687-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:55:52Z","timestamp":1558288552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24687-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221159","9783540246879"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24687-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}