{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T16:40:30Z","timestamp":1768322430774,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540787600","type":"print"},{"value":"9783540787617","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-78761-7_6","type":"book-chapter","created":{"date-parts":[[2008,4,2]],"date-time":"2008-04-02T14:24:48Z","timestamp":1207146288000},"page":"52-61","source":"Crossref","is-referenced-by-count":3,"title":["A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection"],"prefix":"10.1007","author":[{"given":"M. Zubair","family":"Shafiq","sequence":"first","affiliation":[]},{"given":"Muddassar","family":"Farooq","sequence":"additional","affiliation":[]},{"given":"Syed Ali","family":"Khayam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: Usenix Security Symposium (2002)"},{"key":"6_CR2","unstructured":"Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet Quarantine: Requirements for Containing Self-Propagating Code. In: IEEE Infocom (2003)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Gu, Y., McCullum, A., Towsley, D.: Detecting anomalies in network traffic using maximum entropy estimation. In: ACM\/Usenix IMC (2005)","DOI":"10.1145\/1330107.1330148"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM Sigcomm (2005)","DOI":"10.1145\/1080091.1080118"},{"key":"6_CR5","unstructured":"Endpoint Security, http:\/\/www.endpointsecurity.org"},{"key":"6_CR6","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley-Interscience, Chichester (1991)"},{"issue":"22","key":"6_CR7","doi-asserted-by":"publisher","first-page":"1414","DOI":"10.1109\/21.199466","volume":"6","author":"L.-X. Wang","year":"1992","unstructured":"Wang, L.-X., Mendel, J.M.: Generating Fuzzy Rules by Learning from Examples. IEEE Transactions on Systems, Man, and Cybernetics\u00a06(22), 1414\u20131427 (1992)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"6_CR8","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"C.M. Bishop","year":"1995","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press, Oxford (1995)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/21.256541","volume":"23","author":"J.-S.R. Jang","year":"1993","unstructured":"Jang, J.-S.R.: ANFIS: Adaptive-Network-Based Fuzzy Inference System. IEEE Transactions on System, Man and Cybernetics\u00a0(23), 665\u2013685 (1993)","journal-title":"IEEE Transactions on System, Man and Cybernetics"},{"key":"6_CR10","unstructured":"T. Fawcett.: ROC Graphs: Notes and Practical Considerations for Researchers, Technical report (HPL-2003-4), HP Laboratories, Palo Alto, CA, 2003-4, USA (2003)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78761-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T10:35:38Z","timestamp":1708770938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78761-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540787600","9783540787617"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78761-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}