{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:16:02Z","timestamp":1725491762465},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748267"},{"type":"electronic","value":"9783540748274"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74827-4_17","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T19:35:16Z","timestamp":1189539316000},"page":"133-140","source":"Crossref","is-referenced-by-count":0,"title":["IDS Based on Bio-inspired Models"],"prefix":"10.1007","author":[{"given":"Paolo","family":"Gastaldo","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Picasso","sequence":"additional","affiliation":[]},{"given":"Rodolfo","family":"Zunino","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]},{"given":"Emilio","family":"Corchado","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"S\u00e1iz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/11553595_6","volume-title":"Image Analysis and Processing \u2013 ICIAP 2005","author":"P. Laskov","year":"2005","unstructured":"Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol.\u00a03617, pp. 50\u201357. Springer, Heidelberg (2005)"},{"key":"17_CR2","volume-title":"Introduction to the Theory of Neural Computation","author":"J.A. Hertz","year":"1991","unstructured":"Hertz, J.A., Krogh, A., Palmer, R.G.: Introduction to the Theory of Neural Computation. Addison-Wesley, Redwood City, CA (1991)"},{"issue":"9","key":"17_CR3","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/T-C.1974.224051","volume":"23","author":"J.H. Friedman","year":"1974","unstructured":"Friedman, J.H., Tukey, J.W.: A Projection Pursuit Algorithm for Exploratory Data-Analysis. IEEE Transactions on Computers\u00a023(9), 881\u2013890 (1974)","journal-title":"IEEE Transactions on Computers"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1007\/11550907_143","volume-title":"Artificial Neural Networks: Formal Models and Their Applications \u2013 ICANN 2005","author":"E. Corchado","year":"2005","unstructured":"Corchado, E., Herrero, A., S\u00e1iz, J.M.: Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadro\u017cny, S. (eds.) ICANN 2005. LNCS, vol.\u00a03697, pp. 905\u2013910. Springer, Heidelberg (2005)"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1093\/ietisy\/e89-d.1.201","volume":"89","author":"J. Zheng","year":"2006","unstructured":"Zheng, J., Hu, M.: An Anomaly Intrusion Detection System Based on Vector Quantization. IEICE - Trans. Inf. Syst.\u00a0E89-D(1), 201\u2013210 (2006)","journal-title":"IEICE - Trans. Inf. Syst."},{"issue":"8","key":"17_CR6","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1142\/S0218001403002915","volume":"17","author":"E. Corchado","year":"2003","unstructured":"Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. Int. J. Patt. Recogn. Artif. Intell.\u00a017(8), 1447\u20131466 (2003)","journal-title":"Int. J. Patt. Recogn. Artif. Intell."},{"issue":"2","key":"17_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1002\/aic.690370209","volume":"37","author":"M.A. Kramer","year":"1991","unstructured":"Kramer, M.A.: Nonlinear Principal Component Analysis Using Autoassociative Neural Networks. AIChE Journal\u00a037(2), 233\u2013243 (1991)","journal-title":"AIChE Journal"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-39945-3_11","volume-title":"Recent Advances in Intrusion Detection","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. In: Debar, H., M\u00e9, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.\u00a01907, pp. 162\u2013182. Springer, Heidelberg (2000)"},{"key":"17_CR9","unstructured":"Sabhnani, M., Serpen, G.: Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context. In: 2003 Int. Conference on Machine Learning, Models, Technologies and Applications, pp. 623\u2013630 (2003)"},{"key":"17_CR10","first-page":"130","volume-title":"Proc. IEEE Symposium on Security and Privacy (S&P 2001)","author":"W. Lee","year":"2001","unstructured":"Lee, W., Xiang, D.: Information-theoretic Measures for Anomaly Detection. In: Proc. IEEE Symposium on Security and Privacy (S&P 2001), pp. 130\u2013143. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"17_CR11","volume-title":"Proc. 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"W. Lee","year":"1999","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. In: Proc. 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, San Diego, California (1999)"},{"issue":"6","key":"17_CR12","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J., Mok, K.W.: Adaptive Intrusion Detection: A Data Mining Approach. Artificial Intelligence Review\u00a014(6), 533\u2013567 (2000)","journal-title":"Artificial Intelligence Review"},{"issue":"3","key":"17_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:DAMI.0000023673.23078.a3","volume":"8","author":"E. Corchado","year":"2004","unstructured":"Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery\u00a08(3), 203\u2013225 (2004)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"17_CR14","first-page":"350","volume":"10","author":"H.S. Seung","year":"1998","unstructured":"Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems\u00a010, 350\u2013356 (1998)","journal-title":"Advances in Neural Information Processing Systems"},{"key":"17_CR15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5236.001.0001","volume-title":"Parallel Distributed Processing","author":"D.E. Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., McClelland, J.L.: Parallel Distributed Processing. MIT Press, MA (1986)"},{"key":"17_CR16","unstructured":"Cisco Secure Consulting: Vulnerability Statistics Report (2000)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1138","DOI":"10.1007\/978-3-540-73007-1_138","volume-title":"IWANN\u20192007","author":"A. Herrero","year":"2007","unstructured":"Herrero, A., Corchado, E., Gastaldo, P., Zunino, R.: A Comparison of Neural Projection Techniques Applied to Intrusion Detection Systems. In: Sandoval, F., Prieto, A., Cabestany, J., Gra\u00f1a, M. (eds.) IWANN\u20192007. LNCS, vol.\u00a04507, pp. 1138\u20131146. Springer, Heidelberg (2007)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1424","DOI":"10.1007\/11875581_169","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2006","author":"A. Herrero","year":"2006","unstructured":"Herrero, A., Corchado, E., S\u00e1iz, J.M.: MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection. In: Corchado, E., Yin, H., Botti, V., Fyfe, C. (eds.) IDEAL 2006. LNCS, vol.\u00a04224, pp. 1424\u20131433. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74827-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T03:48:10Z","timestamp":1629690490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74827-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748267","9783540748274"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74827-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}