{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:25:13Z","timestamp":1773858313873,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540881803","type":"print"},{"value":"9783540881810","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_18","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"139-146","source":"Crossref","is-referenced-by-count":4,"title":["An Intrusion Detection System Based on Hierarchical Self-Organization"],"prefix":"10.1007","author":[{"given":"E. J.","family":"Palomo","sequence":"first","affiliation":[]},{"given":"E.","family":"Dom\u00ednguez","sequence":"additional","affiliation":[]},{"given":"R. M.","family":"Luque","sequence":"additional","affiliation":[]},{"given":"J.","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"18_CR1","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D. Denning","year":"1987","unstructured":"Denning, D.: An intrusion-detection model. Software Engineering. IEEE Transactions on SE\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on SE"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real time data mining-based intrusion detection. In: DARPA Information Survivability Conference & Exposition II, vol.\u00a01, pp. 89\u2013100 (2001)","DOI":"10.1109\/DISCEX.2001.932195"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/12.980003","volume":"51","author":"R. Maxion","year":"2002","unstructured":"Maxion, R., Tan, K.: Anomaly detection in embedded systems. IEEE Transactions on Computers\u00a051(2), 108\u2013120 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"18_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/JSAC.2002.806130","volume":"21","author":"K. Tan","year":"2003","unstructured":"Tan, K., Maxion, R.: Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communications\u00a021(1), 96\u2013110 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Ying, H., Feng, T.J., Cao, J.K., Ding, X.Q., Zhou, Y.H.: Research on some problems in the kohonen som algorithm. In: International Conference on Machine Learning and Cybernetics, vol.\u00a03, pp. 1279\u20131282 (2002)","DOI":"10.1109\/ICMLC.2002.1167409"},{"issue":"1","key":"18_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF00337288","volume":"43","author":"T. Kohonen","year":"1982","unstructured":"Kohonen, T.: Self-organized formation of topologically correct feature maps. Biological cybernetics\u00a043(1), 59\u201369 (1982)","journal-title":"Biological cybernetics"},{"issue":"5","key":"18_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/BF02332159","volume":"2","author":"B. Fritzke","year":"1995","unstructured":"Fritzke, B.: Growing grid - a self-organizing network with constant neighborhood range and adaptation strength. Neural Processing Letters\u00a02(5), 9\u201313 (1995)","journal-title":"Neural Processing Letters"},{"key":"18_CR8","unstructured":"Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"},{"issue":"2","key":"18_CR9","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TSMCB.2005.843274","volume":"35","author":"S. Sarasamma","year":"2005","unstructured":"Sarasamma, S., Zhu, Q., Hu, J.: Hierarchical kohonenen net for anomaly detection in network security. IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics\u00a035(2), 302\u2013312 (2005)","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"DeLooze, L., DeLooze, A.F.: Attack characterization and intrusion detection using an ensemble of self-organizing maps. In: 7th Annual IEEE Information Assurance Workshop, pp. 108\u2013115 (2006)","DOI":"10.1109\/IJCNN.2006.246983"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T04:09:57Z","timestamp":1738469397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_18","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"value":"1867-5662","type":"print"},{"value":"1860-0794","type":"electronic"}],"subject":[]}}