{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:46Z","timestamp":1725490246058},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747413"},{"type":"electronic","value":"9783540747420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74742-0_30","type":"book-chapter","created":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T11:03:30Z","timestamp":1187694210000},"page":"314-325","source":"Crossref","is-referenced-by-count":5,"title":["A Distributed Hebb Neural Network for Network Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Daxin","family":"Tian","sequence":"first","affiliation":[]},{"given":"Yanheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"30_CR1","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1016\/j.comnet.2006.09.016","volume":"51","author":"K.L. Ingham","year":"2007","unstructured":"Ingham, K.L., Somayaji, A., Burge, J., Forrest, S.: Learning DFA Representations of HTTP For Protecting Web Applications. Computer Networks\u00a051(5), 1239\u20131255 (2007)","journal-title":"Computer Networks"},{"issue":"1","key":"30_CR2","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jnca.2005.06.002","volume":"30","author":"T. \u00d6zyer","year":"2007","unstructured":"\u00d6zyer, T., Alhajj, R., Barker, K.: Intrusion Detection By Integrating Boosting Genetic Fuzzy Classifier and Data Mining Criteria for Rule Pre-screening. Journal of Network and Computer Applications\u00a030(1), 99\u2013113 (2007)","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"30_CR3","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.cose.2006.05.005","volume":"25","author":"W. Wang","year":"2006","unstructured":"Wang, W., Guan, X.H., Zhang, X.L., Yang, L.W.: Profiling Program Behavior for Anomaly Intrusion Detection Based on The Transition and Frequency Property of Computer Audit Data. Computers & Security\u00a025(7), 539\u2013550 (2006)","journal-title":"Computers & Security"},{"issue":"4","key":"30_CR4","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1145\/950191.950192","volume":"6","author":"K. Julisch","year":"2003","unstructured":"Julisch, K.: Clustering Intrusion Detection Alarms to Support Root Cause Analysis. ACM Transactions on Information and System Security\u00a06(4), 443\u2013471 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"30_CR5","unstructured":"Lee, W., Stolfo, S., Kui, M.: A Data Mining Framework for Building Intrusion Detection Models. In: IEEE Symposium on Security and Privacy, Oakland, pp. 120\u2013132 (1999)"},{"key":"30_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/11604938_4","volume-title":"Information Security Applications","author":"M.S. Shin","year":"2006","unstructured":"Shin, M.S., Jeong, K.J: An Alert Data Mining Framework for Network-based Intrusion Detection System. In: Song, J., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 38\u201353. Springer, Heidelberg (2006)"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1016\/S1389-1286(99)00114-0","volume":"31","author":"M.Y. Huang","year":"1999","unstructured":"Huang, M.Y., Jasper, R.J., Wicks, T.M.: A Large Scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis. Computer Networks\u00a031, 2465\u20132475 (1999)","journal-title":"Computer Networks"},{"issue":"4","key":"30_CR8","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1145\/950191.950192","volume":"6","author":"K. Julisch","year":"2003","unstructured":"Julisch, K.: Clustering Intrusion Detection Alarms to Support Root Cause Analysis. ACM Transactions on Information and System Security\u00a06(4), 443\u2013471 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"30_CR9","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A New Intrusion Detection System Using Support Vector Machines and Hierarchical Clustering. The International Journal on Very Large Data Bases, online first, 1\u201315 (2006)"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-540-25952-7_17","volume-title":"Intelligence and Security Informatics","author":"X.Y. Li","year":"2004","unstructured":"Li, X.Y., Ye, N.: Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 226\u2013238. Springer, Heidelberg (2004)"},{"issue":"1","key":"30_CR11","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.dss.2004.06.016","volume":"41","author":"X.B. Li","year":"2005","unstructured":"Li, X.B.: A Scalable Decision Tree System and Its Application in Pattern Recognition and Intrusion Detection. Decision Support Systems\u00a041(1), 112\u2013130 (2005)","journal-title":"Decision Support Systems"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0957-4174(02)00185-9","volume":"24","author":"C.P. Wei","year":"2003","unstructured":"Wei, C.P., Lee, Y.H., Hsu, C.M.: Empirical Comparison of Fast Partitioning-based Clustering Algorithms for Large Data Sets. Expert Systems with Applications\u00a024, 351\u2013363 (2003)","journal-title":"Expert Systems with Applications"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1145\/956750.956833","volume-title":"Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"W. Peter","year":"2003","unstructured":"Peter, W., Chiochetti, J., Giardina, C.: New Unsupervised Clustering Algorithm for Large Datasets. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, D.C, pp. 643\u2013648. ACM Press, New York (2003)"},{"key":"30_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/978-3-540-24669-5_31","volume-title":"PPAM 2004","author":"A. Gursoy","year":"2004","unstructured":"Gursoy, A.: Data Decomposition for Parallel K-means Clustering. In: Wyrzykowski, R., Dongarra, J.J., Paprzycki, M., Wa\u015bniewski, J. (eds.) PPAM 2004. LNCS, vol.\u00a03019, pp. 241\u2013248. Springer, Heidelberg (2004)"},{"issue":"2","key":"30_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1132956.1132958","volume":"38","author":"A. Ceglar","year":"2006","unstructured":"Ceglar, A., Roddick, J.F.: Association Mining. ACM Computing Surveys\u00a038(2), 1\u201342 (2006)","journal-title":"ACM Computing Surveys"},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00011656","volume":"3","author":"S. Parthasarathy","year":"2001","unstructured":"Parthasarathy, S., Zaki, M.J., Ogihara, M., Li, W.: Parallel Data Mining for Association Rules on Shared-memory Systems. Knowledge and Information Systems\u00a03, 1\u201329 (2001)","journal-title":"Knowledge and Information Systems"},{"issue":"3","key":"30_CR17","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11390-005-0309-5","volume":"20","author":"C.Y. Jia","year":"2005","unstructured":"Jia, C.Y., Gao, X.P.: Multi-scaling Sampling: an Adaptive Sampling Method for Discovering Approximate Association Rules. Journal of Computer Science and Technology\u00a020(3), 309\u2013318 (2005)","journal-title":"Journal of Computer Science and Technology"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Tuv, E., Borisov, A., Torkkola, K.: Best Subset Feature Selection for Massive Mixed-type Problems. In: Proceedings of the 7th International Conference on Intelligent Data Engineering and Automated Learning, Burgos, Spain, pp. 1048\u20131056 (2006)","DOI":"10.1007\/11875581_125"},{"key":"30_CR19","series-title":"Lecture Notes in Artificial Intelligence","first-page":"683","volume-title":"PAKDD 2005","author":"W.Y. Tang","year":"2005","unstructured":"Tang, W.Y., Mao, K.Z.: Feature Selection Algorithm for Data with Both Nominal and Continuous Features. In: Ho, T.-B., Cheung, D., Liu, H. (eds.) PAKDD 2005. LNCS (LNAI), vol.\u00a03518, pp. 683\u2013688. Springer, Heidelberg (2005)"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Amado, N., Gama, J., Silva, F.: Parallel Implementation of Decision Tree Learning Algorithms. In: Proceedings of the 10th Portuguese Conference on Artificial Intelligence, Porto, Portugal, pp. 6\u201313 (2001)","DOI":"10.1007\/3-540-45329-6_4"},{"issue":"3","key":"30_CR21","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1023\/A:1021709817809","volume":"50","author":"L. Todorovski","year":"2003","unstructured":"Todorovski, L., Dzeroski, S.: Combining Classifiers With Meta Decision Trees. Machine Learning\u00a050(3), 223\u2013249 (2003)","journal-title":"Machine Learning"},{"issue":"11","key":"30_CR22","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1162\/neco.1995.7.1.108","volume":"7","author":"C.M. Bishop","year":"1995","unstructured":"Bishop, C.M.: Training With Noise is Equivalent to Tikhonov Regularization. Neural computation\u00a07(11), 108\u2013116 (1995)","journal-title":"Neural computation"},{"key":"30_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/neco.1992.4.1.1","volume":"4","author":"S. Geman","year":"1992","unstructured":"Geman, S., Bienenstock, E., Doursat, R.: Neural Networks and The Bias\/variance Dilemma. Neural Computation\u00a04, 1\u201358 (1992)","journal-title":"Neural Computation"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: GP Ensemble for Distributed Intrusion Detection Systems. In: Proceedings of the 3rd International Conference on Advanced in Pattern Recognition, Bath, UK, pp. 54\u201362 (2005)","DOI":"10.1007\/11551188_6"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74742-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T11:56:46Z","timestamp":1550836606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74742-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540747413","9783540747420"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74742-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}