{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T05:28:36Z","timestamp":1738387716366,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540875352"},{"type":"electronic","value":"9783540875369"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87536-9_70","type":"book-chapter","created":{"date-parts":[[2008,9,5]],"date-time":"2008-09-05T15:23:30Z","timestamp":1220628210000},"page":"680-689","source":"Crossref","is-referenced-by-count":9,"title":["A New GHSOM Model Applied to Network Security"],"prefix":"10.1007","author":[{"given":"Esteban J.","family":"Palomo","sequence":"first","affiliation":[]},{"given":"Enrique","family":"Dom\u00ednguez","sequence":"additional","affiliation":[]},{"given":"Rafael Marcos","family":"Luque","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"70_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF00337288","volume":"43","author":"T. Kohonen","year":"1982","unstructured":"Kohonen, T.: Self-organized formation of topologically correct feature maps. Biological cybernetics\u00a043(1), 59\u201369 (1982)","journal-title":"Biological cybernetics"},{"issue":"6","key":"70_CR2","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TNN.2002.804221","volume":"13","author":"A. Rauber","year":"2002","unstructured":"Rauber, A., Merkl, D., Dittenbach, M.: The growing hierarchical self-organizing map: Exploratory analysis of high-dimensional data. IEEE Transactions on Neural Networks\u00a013(6), 1331\u20131341 (2002)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"70_CR3","doi-asserted-by":"crossref","unstructured":"Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real time data mining-based intrusion detection. In: DARPA Information Survivability Conference and Exposition II, vol.\u00a01, pp. 89\u2013100 (2001)","DOI":"10.1109\/DISCEX.2001.932195"},{"issue":"2","key":"70_CR4","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/12.980003","volume":"51","author":"R. Maxion","year":"2002","unstructured":"Maxion, R., Tan, K.: Anomaly detection in embedded systems. IEEE Transactions on Computers\u00a051(2), 108\u2013120 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"70_CR5","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/JSAC.2002.806130","volume":"21","author":"K. Tan","year":"2003","unstructured":"Tan, K., Maxion, R.: Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communications\u00a021(1), 96\u2013110 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"70_CR6","doi-asserted-by":"crossref","unstructured":"Ying, H., Feng, T.J., Cao, J.K., Ding, X.Q., Zhou, Y.H.: Research on some problems in the kohonen som algorithm. In: International Conference on Machine Learning and Cybernetics, vol.\u00a03, pp. 1279\u20131282 (2002)","DOI":"10.1109\/ICMLC.2002.1167409"},{"key":"70_CR7","unstructured":"Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"},{"key":"70_CR8","doi-asserted-by":"crossref","unstructured":"Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P.: Cost-based modeling for fraud and intrusion detection: results from the jam project. In: DARPA Information Survivability Conference and Exposition, 2000, DISCEX 2000. Proceedings, vol.\u00a02, pp. 130\u2013144 (2000)","DOI":"10.1109\/DISCEX.2000.821515"},{"issue":"2","key":"70_CR9","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TSMCB.2005.843274","volume":"35","author":"S. Sarasamma","year":"2005","unstructured":"Sarasamma, S., Zhu, Q., Huff, J.: Hierarchical kohonenen net for anomaly detection in network security. IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics\u00a035(2), 302\u2013312 (2005)","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics"},{"issue":"5","key":"70_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/BF02332159","volume":"2","author":"B. Fritzke","year":"1995","unstructured":"Fritzke, B.: Growing grid - a self-organizing network with constant neighborhood range and adaptation strength. Neural Processing Letters\u00a02(5), 9\u201313 (1995)","journal-title":"Neural Processing Letters"},{"key":"70_CR11","doi-asserted-by":"crossref","unstructured":"Dittenbach, M., Rauber, A., Merkl, D.: Recent advances with the growing hierarchical self-organizing map. In: 3rd Workshop on Self-Organising Maps (WSOM), pp. 140\u2013145 (2001)","DOI":"10.1007\/978-1-4471-0715-6_20"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks - ICANN 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87536-9_70.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T21:07:52Z","timestamp":1738357672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87536-9_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540875352","9783540875369"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87536-9_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}