{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T10:53:00Z","timestamp":1763808780573,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705598"},{"type":"electronic","value":"9783540705604"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-70560-4_4","type":"book-chapter","created":{"date-parts":[[2008,9,9]],"date-time":"2008-09-09T09:16:32Z","timestamp":1220951792000},"page":"39-48","source":"Crossref","is-referenced-by-count":4,"title":["An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction"],"prefix":"10.1007","author":[{"given":"Mahmoud","family":"Jazzar","sequence":"first","affiliation":[]},{"given":"Aman","family":"Jantan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"4_CR1","first-page":"91","volume":"1","author":"J. Aguilar","year":"2003","unstructured":"Aguilar, J.: A dynamic fuzzy-cognitive-map approach based on random neural networks. International Journal of Computational Cognition\u00a01(4), 91\u2013107 (2003)","journal-title":"International Journal of Computational Cognition"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/CNSR.2007.70","volume-title":"Proceedings of Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007)","author":"R. Alshammari","year":"2007","unstructured":"Alshammari, R., Sonamthiang, S., Teimouri, M., Riordan, D.: Using neurofuzzy approach to reduce false positive alerts. In: Proceedings of Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), pp. 345\u2013349. IEEE Computer Sociey Press, Los Alamitos (2007)"},{"key":"4_CR3","volume-title":"Structure of Decision: The Cognitive Maps of the Political Elites","author":"R. Axelrod","year":"1976","unstructured":"Axelrod, R.: Structure of Decision: The Cognitive Maps of the Political Elites. Princeton University Press, New Jersey (1976)"},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An intrusion model. IEEE Transactions on Software Engineering\u00a0SE-13(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O. Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Kemal, C.M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications\u00a029, 713\u2013722 (2005)","journal-title":"Expert Systems with Applications"},{"key":"4_CR6","unstructured":"Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy intrusion detection. In: Proceedings of IFSA World Congress and 20th North American Fuzzy Information Processing Society (NAFIPS) International Conference, Vancouver, British Columbia (2001)"},{"key":"4_CR7","unstructured":"KDD Cup 1999 Data. Knowledge Discovery in Databases DARPA Archive. Accessed December 2007, \n                    http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"4_CR8","unstructured":"Kendall, K.: A database of computer attacks for the evaluation of intrusion detection systems. Master\u2019s thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, Cambridge, MA (1999)"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0020-7373(86)80040-2","volume":"24","author":"B. Kosko","year":"1986","unstructured":"Kosko, B.: Fuzzy cognitive maps. International Journal of Man-Machine Studies\u00a024, 65\u201375 (1986)","journal-title":"International Journal of Man-Machine Studies"},{"key":"4_CR10","volume-title":"Fuzzy Engineering","author":"B. Kosko","year":"1997","unstructured":"Kosko, B.: Fuzzy Engineering. Prentice-Hall, Englewood Cliffs (1997)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Lee, S.Y., Kim, Y.S., Lee, B.H., Kang, S., Youn, C.H.: A probe detection model using the analysis of the fuzzy cognitive maps. In: Proceedings of the International Conference on Computational Science and its Applications (ICCSA), vol.\u00a01, pp. 320\u2013328 (2005)","DOI":"10.1007\/11424758_34"},{"issue":"6","key":"4_CR12","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: Adaptive intrusion detection: A data mining approach. Artificial Intelligence Review\u00a014(6), 533\u2013567 (2000)","journal-title":"Artificial Intelligence Review"},{"key":"4_CR13","unstructured":"Liu, Y., Tian, D., Wang, A.: ANNIDS: Intrusion detection system based on artificial neural network. In: Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi\u2019an (2003)"},{"key":"4_CR14","unstructured":"MIT Lincoln Lab: DARPA Intrusion Detection Evaluation Plan. Accessed December 2007, \n                    http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/2000\/2000_data_index.html"},{"key":"4_CR15","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modelling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications (2005), DOI 10.1016\/j.jnca.2005.06.003"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TSMCB.2005.843274","volume":"35","author":"S.T. Sarasamma","year":"2005","unstructured":"Sarasamma, S.T., Zhu, Q.A., Huff, J.: Hierarchal kohonenen net for anomaly detection in network security. IEEE Transactions on Systems, Man, and Cybernetics- Part B: Cybernetics\u00a035(2), 302\u2013312 (2005)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics- Part B: Cybernetics"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Siraj, A., Vaughn, R.B., Bridges, S.M.: Intrusion sensor data fusion in an intelligent intrusion detection system architecture. In: Proceedings of the 37th Hawaii International Conference on System Sciences (2004)","DOI":"10.1109\/HICSS.2004.1265658"},{"key":"4_CR18","unstructured":"Stylios, C.D., Groumpos, P.P.: Mathematical formulation of fuzzy cognitive maps. In: Proceedings of the 7th Mediterranean Conference on Control and Automation (MED 1999), Haifa, Israel (1999)"},{"key":"4_CR19","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1016\/j.comcom.2007.05.002","volume":"30","author":"A.N. Toosi","year":"2007","unstructured":"Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer Communications\u00a030, 2201\u20132212 (2007)","journal-title":"Computer Communications"}],"container-title":["Studies in Computational Intelligence","Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70560-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T17:42:34Z","timestamp":1676050954000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-70560-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540705598","9783540705604"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70560-4_4","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2008]]}}}