{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:36:09Z","timestamp":1725496569384},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770916"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77092-3_31","type":"book-chapter","created":{"date-parts":[[2007,11,24]],"date-time":"2007-11-24T07:59:32Z","timestamp":1195891172000},"page":"356-366","source":"Crossref","is-referenced-by-count":3,"title":["SOM-Based Anomaly Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Chun-dong","family":"Wang","sequence":"first","affiliation":[]},{"given":"He-feng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Huai-bin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"31_CR1","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/0169-2070(95)00625-7","volume":"12","author":"K. Ord","year":"1996","unstructured":"Ord, K.: Outliers in statistical data: V.barnett and t.lewis. International Journal of Forecasting\u00a012(1), 175\u2013176 (1996)","journal-title":"International Journal of Forecasting"},{"key":"31_CR2","series-title":"Springer Series in Information Sciences","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-Organizing Maps","author":"T. Kohonen","year":"1995","unstructured":"Kohonen, T.: Self-Organizing Maps. Springer Series in Information Sciences, vol.\u00a030. Springer, Heidelberg (1995) (second extended edition 1997)"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Zanero, S., Savaresi, S.M.: Unsupervised Learning Techniques for an Intrusion Detection System [C]. In: Proceedings of 2004 ACM Symposium on Applied Computing, Nicosia, Cyprus (2004)","DOI":"10.1145\/967900.967988"},{"key":"31_CR4","first-page":"36","volume":"8","author":"Z. Dangfeng","year":"2006","unstructured":"Dangfeng, Z., Chunhui, H.: Research on Intrusion Detection Technique Based on Rapidly BP Learning Algorithm. Network Security Technology and Application\u00a0(8), 36\u201337, 33 (2006)","journal-title":"Network Security Technology and Application"},{"issue":"13","key":"31_CR5","first-page":"154","volume":"31","author":"W. Shengjun","year":"2005","unstructured":"Shengjun, W., Changzhen, H., Fei, J.: An Intrusion Detection Method Based on Improved BP Neural Network Algorithm. Computer Engineering\u00a031(13), 154\u2013155, 158 (2005)","journal-title":"Computer Engineering"},{"key":"31_CR6","volume-title":"Neural Network Design","author":"M.T. Hagan","year":"2002","unstructured":"Hagan, M.T., Dcmuch, H.B., Beale, M.: Neural Network Design. China Machine Press, Beijing (2002)"},{"key":"31_CR7","unstructured":"Kohonen, T., Hynninen, J., Kangas, J., Laaksonen, J.: SOM_PAK, The Self-Organizing Map Program Package, Version 3.1 (1995)"},{"key":"31_CR8","unstructured":"The Self-Organizing Map Program Package, \n                    \n                      http:\/\/www.cis.hut.fi\/research\/som_pak\/"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77092-3_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:59:08Z","timestamp":1619521148000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77092-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770916"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77092-3_31","relation":{},"subject":[]}}