{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:54:03Z","timestamp":1725533643560},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642023187"},{"type":"electronic","value":"9783642023194"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02319-4_72","type":"book-chapter","created":{"date-parts":[[2009,6,20]],"date-time":"2009-06-20T02:34:09Z","timestamp":1245465249000},"page":"597-604","source":"Crossref","is-referenced-by-count":5,"title":["Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments"],"prefix":"10.1007","author":[{"given":"G.","family":"Corral","sequence":"first","affiliation":[]},{"given":"A.","family":"Garcia-Piquer","sequence":"additional","affiliation":[]},{"given":"A.","family":"Orriols-Puig","sequence":"additional","affiliation":[]},{"given":"A.","family":"Fornells","sequence":"additional","affiliation":[]},{"given":"E.","family":"Golobardes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"72_CR1","unstructured":"Anchor, K., Zydallis, J., Gunsch, G.: Extending the computer defense immune system: Network intrusion detection with a multiobjective evolutionary programming approach. In: 1st Conf. on Artificial Immune Systems, pp. 12\u201321 (2002)"},{"key":"72_CR2","unstructured":"Bloedorn, E., Talbot, L., DeBarr, D.: Data Mining Applied to Intrusion Detection: MITRE Experiences. In: Maloof, M.A. (ed.). Springer, Heidelberg (2005)"},{"key":"72_CR3","series-title":"Advances in Soft Computing","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-540-74972-1_16","volume-title":"Innovations in Hybrid Intelligent Systems","author":"G. Corral","year":"2008","unstructured":"Corral, G., Armengol, E., Fornells, A., Golobardes, E.: Data security analysis using unsupervised learning and explanations. In: Innovations in Hybrid Intelligent Systems. Advances in Soft Computing, vol.\u00a044, pp. 112\u2013119. Springer, Heidelberg (2008)"},{"key":"72_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/11875581_59","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2006","author":"G. Corral","year":"2006","unstructured":"Corral, G., Fornells, A., Golobardes, E., Abella, J.: Cohesion factors: improving the clustering capabilities of consensus. In: Corchado, E., Yin, H., Botti, V., Fyfe, C. (eds.) IDEAL 2006. LNCS, vol.\u00a04224, pp. 488\u2013495. Springer, Heidelberg (2006)"},{"key":"72_CR5","doi-asserted-by":"crossref","unstructured":"Corral, G., Zaballos, A., Cadenas, X., Grane, A.: A distributed vulnerability detection system for an intranet. In: Proceedings of the 39th IEEE International Carnahan Conference on Security Technology (ICCST 2005), pp. 291\u2013295 (2005)","DOI":"10.1109\/CCST.2005.1594863"},{"key":"72_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TPAMI.1979.4766909","volume":"4","author":"D.L. Davies","year":"1979","unstructured":"Davies, D.L., Bouldin, D.W.: A cluster separation measure. IEEE Transactions on Pattern Analysis and Machine Learning\u00a04, 224\u2013227 (1979)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Learning"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Dawkins, J., Dale, J.: A systematic approach to multi-stage network attack analysis. In: 2nd. IEEE Int. Information Assurance Workshop (IWIA 2004) (2004)","DOI":"10.1109\/IWIA.2004.1288037"},{"key":"72_CR8","doi-asserted-by":"crossref","unstructured":"DeLooze, L.: Classification of computer attacks using a self-organizing map. In: Proc. of the 2004 IEEE Workshop on Information Assurance, pp. 365\u2013369 (2004)","DOI":"10.1109\/IAW.2004.1437840"},{"key":"72_CR9","doi-asserted-by":"crossref","unstructured":"Depren, M.O., Topallar, M., Anarim, E., Ciliz, K.: Network-based anomaly intrusion detection system using soms. In: Proc. of the IEEE 12th Signal Processing and Communications Applications Conference, pp. 76\u201379 (2004)","DOI":"10.1109\/SIU.2004.1338261"},{"key":"72_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/01969727408546059","volume":"4","author":"J.C. Dunn","year":"1974","unstructured":"Dunn, J.C.: Well separated clusters and optimal fuzzy partitions. Journal of Cybernetics\u00a04, 95\u2013104 (1974)","journal-title":"Journal of Cybernetics"},{"issue":"3","key":"72_CR11","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1016\/j.dss.2004.06.004","volume":"41","author":"M. Gupta","year":"2006","unstructured":"Gupta, M., Rees, J., Chaturvedi, A., Chi, J.: Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decision Support Systems\u00a041(3), 592\u2013603 (2006)","journal-title":"Decision Support Systems"},{"issue":"1","key":"72_CR12","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/TEVC.2006.877146","volume":"11","author":"J. Handl","year":"2007","unstructured":"Handl, J., Knowles, J.: An evolutionary approach to multiobjective clustering. IEEE Transactions on Evolutionary Computation\u00a011(1), 56\u201376 (2007)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"72_CR13","volume-title":"Clustering Algorithms","author":"J.A. Hartigan","year":"1975","unstructured":"Hartigan, J.A.: Clustering Algorithms. John Wiley and Sons, New York (1975)"},{"key":"72_CR14","volume-title":"Self-Organizing Maps","author":"T. Kohonen","year":"2000","unstructured":"Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer, Heidelberg (2000)","edition":"3"},{"key":"72_CR15","unstructured":"Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proc. 28th Australasian CS Conf., vol.\u00a038 (2005)"},{"key":"72_CR16","doi-asserted-by":"crossref","unstructured":"Peltier, T.R., Peltier, J., Blackley, J.: Managing a Network Vulnerability Assessment. Auerbach Publishers Inc. (2003)","DOI":"10.1201\/9780203503041"},{"key":"72_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-45248-5_3","volume-title":"Recent Advances in Intrusion Detection","author":"M. Ramadas","year":"2003","unstructured":"Ramadas, M., Ostermann, S., Tjaden, B.C.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 36\u201354. Springer, Heidelberg (2003)"},{"key":"72_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"P. Rousseeuw","year":"1987","unstructured":"Rousseeuw, P.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. of Comp. Applic. in Math\u00a020, 53\u201365 (1987)","journal-title":"J. of Comp. Applic. in Math"},{"key":"72_CR19","doi-asserted-by":"crossref","unstructured":"Yang, E., Erdogan, A., Arslan, T., Barton, N.: Multi-objective evolutionary optimizations of a space-based reconfigurable sensor network under hard constraints. In: Symp. on Bioinspired, Learning, and Int. Syst. for Security, pp. 72\u201375 (2007)","DOI":"10.1109\/BLISS.2007.20"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02319-4_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T05:35:15Z","timestamp":1547876115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02319-4_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642023187","9783642023194"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02319-4_72","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}