{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:12:41Z","timestamp":1725574361574},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235781"},{"type":"electronic","value":"9783540302070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30207-0_66","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T20:51:21Z","timestamp":1294433481000},"page":"530-537","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection Using Fast SOFM"],"prefix":"10.1007","author":[{"given":"Jun","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Mingzeng","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","volume-title":"Applications of Data Mining in Computer Security","author":"E. Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M.: A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. In: Applications of Data Mining in Computer Security, Kluwer, Dordrecht (2002)"},{"key":"66_CR2","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: Proceedings of the 2003 Symposium on Applications and the Internet (2003)","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"66_CR3","unstructured":"Mukkamala, S., Sung, A.H.: Identifying key features for intrusion detection using neural networks. In: Proceedings of the 15th international conference on Computer communication (August 2002)"},{"key":"66_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-88163-3","volume-title":"Self-Organization and Associative Memory","author":"T. Kohonen","year":"1989","unstructured":"Kohonen, T.: Self-Organization and Associative Memory, 3rd edn. Springer, Berlin (1989)","edition":"3"},{"key":"66_CR5","doi-asserted-by":"crossref","unstructured":"Hoglund, A.J., Hatonen, K.: A computer host-based user anomaly detection system using self-organizing map. In: IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN 2000), vol.\u00a05 (2000)","DOI":"10.1109\/IJCNN.2000.861504"},{"key":"66_CR6","doi-asserted-by":"crossref","unstructured":"Lichodzijewski, P., Zineir-Heywood, A.N., Heywood, M.I.: Host-based intrusion detection using self-organizing Maps. In: Proceedings of the 2002 IEEE IJCNN, Hawaii, USA (May 2002)","DOI":"10.1109\/IJCNN.2002.1007776"},{"issue":"2","key":"66_CR7","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TCOMM.1994.577009","volume":"42","author":"T. Torres","year":"1994","unstructured":"Torres, T., Huguet, J.: An improvement on codebook search for vector quantization. IEEE Trans. Commun.\u00a042(2), 208\u2013210 (1994)","journal-title":"IEEE Trans. Commun."},{"key":"66_CR8","doi-asserted-by":"crossref","unstructured":"Miller, G.J., Thompson, K., Wilder, R.: Wide-area Internet traffic patterns and characteristics. IEEE Network, 10\u201323 (November 1997)","DOI":"10.1109\/65.642356"},{"key":"66_CR9","doi-asserted-by":"crossref","unstructured":"Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Usenix Security Symposium, Washington, D.C. (August 2001)","DOI":"10.21236\/ADA400003"},{"issue":"4","key":"66_CR10","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks\u00a034(4), 579\u2013595 (2000)","journal-title":"Computer Networks"},{"key":"66_CR11","unstructured":"1999 DARPA Intrusion Detection Evaluation Dataset, http:\/\/www.ll.mit.edu\/IST\/ideval\/index.html"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30207-0_66.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:48:53Z","timestamp":1605761333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30207-0_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235781","9783540302070"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30207-0_66","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}