{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:50:46Z","timestamp":1725558646677},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201502"},{"type":"electronic","value":"9783540399278"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39927-8_30","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:51:33Z","timestamp":1277686293000},"page":"325-336","source":"Crossref","is-referenced-by-count":11,"title":["A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine"],"prefix":"10.1007","author":[{"given":"Min","family":"Luo","sequence":"first","affiliation":[]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huanguo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Ghosh, A.K.: Learning Program Behavior Profiles for Intrusion Detection. USENIX (1999)"},{"key":"30_CR2","unstructured":"Cannady, J.: Artificial Neural Networks for Misuse Detection. In: National Information Systems Security Conference (1998)"},{"key":"30_CR3","volume-title":"Advances in Neural Information Processing Systems 10","author":"J. Ryan","year":"1998","unstructured":"Ryan, J., Lin, M.-J., Miikkulainen, R.: Intrusion Detection with Neural Networks. In: Advances in Neural Information Processing Systems 10, MIT Press, Cambridge (1998)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Luo, J., Bridges, S.M.: Mining Fuzzy Association Rules and Fuzzy FrequencyEpisodes for Intrusion Detection. International Journal of Intelligent Systems, 687\u2013703. John Wiley & Sons (2000)","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"key":"30_CR5","volume-title":"Data Mining for Security Applications (DMSA 2002)","author":"E. Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., et al.: A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. In: Data Mining for Security Applications (DMSA 2002), Kluwer, Dordrecht (2002)"},{"key":"30_CR6","volume-title":"Data Mining for Security Applications (DMSA 2002)","author":"A. Honig","year":"2002","unstructured":"Honig, A., Howard, A., et al.: Adaptive Model Generation: An Architecture for the Deployment of Data Minig-based Intrusion Detection Systems. In: Data Mining for Security Applications (DMSA 2002), Kluwer, Dordrecht (2002)"},{"key":"30_CR7","unstructured":"Portnoy, L., Eskin, E., et al.: Intrusion Detection with Unlabeled Data Using Clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security(DMSA 2001) (2001)"},{"key":"30_CR8","unstructured":"Mukkamala, S., Janowski, G., et al.: Identifying Important Features For Intrusion Detection Using Support Vector Machines and Neural Networks. In: Applications and the Internet, 2003. Proceedings. 2003 Symposium, pp. 209\u2013216 (2003)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janowski, G., et al.: Intrusion Detection Using Neural Networks and Support Vector Machines. In: Proceedings of IEEE International Joint Conference on Neural Networks 2002, Hawaii, pp. 1702\u20131707 (2002.5)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"30_CR10","unstructured":"Mukkamala, S., Sung, A.H.: Comparison of Neural Networks and Support Vector Machines in Intrusion Detection. In: Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, June 11\u201313 (2002)"},{"issue":"4","key":"30_CR11","first-page":"798","volume":"14","author":"X. Rao","year":"2002","unstructured":"Rao, X.: An Intrusion Detection Based on SVM. Journal of Software\u00a014(4), 798\u2013803 (2002)","journal-title":"Journal of Software"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Chatz, A., Tuzhilin, A.: What Makes Patterns Interesting in Knowledge Discovery Systems. IEEE Transactions on Knowledge and Data Engineering, 970\u2013974 (1996.6)","DOI":"10.1109\/69.553165"},{"key":"30_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V. Vapnik","year":"1995","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, New York (1995)"},{"key":"30_CR14","volume-title":"An Introduction to Support Vector Machines and other kernel-based learning methods","author":"C. Nell","year":"2000","unstructured":"Nell, C., John, S.: An Introduction to Support Vector Machines and other kernel-based learning methods. Cambridge University Press, Cambridge (2000)"},{"issue":"7","key":"30_CR15","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B. Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., et al.: Estimating the support of a high-dimensional distribution. Neural Computation\u00a013(7), 1443\u20131471 (2001)","journal-title":"Neural Computation"},{"key":"30_CR16","unstructured":"http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm"},{"key":"30_CR17","unstructured":"http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.html"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39927-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:41:05Z","timestamp":1559209265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39927-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201502","9783540399278"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39927-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}