{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:57:17Z","timestamp":1725533837528},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026263"},{"type":"electronic","value":"9783642026270"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02627-0_18","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T05:05:54Z","timestamp":1245301554000},"page":"187-190","source":"Crossref","is-referenced-by-count":1,"title":["Fast Learning Neural Network Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Robert","family":"Koch","sequence":"first","affiliation":[]},{"given":"Gabi","family":"Dreo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Wang, H., Liang, Y., Ye, H.: An Extraction Method Of Situational Factors For Network Security Situational Awareness. In: International Conference on Internet Computing in Science and Engineering (2008)","DOI":"10.1109\/ICICSE.2008.53"},{"key":"18_CR2","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/3-540-45034-3_39","volume-title":"Developments in Applied Artificial Intelligence","author":"M. Dass","year":"2003","unstructured":"Dass, M., Cannady, J., Potter, W.: A Blackboard-Based Learning Intrusion Detection System: A New Approach. In: Chung, P.W.H., Hinde, C.J., Ali, M. (eds.) IEA\/AIE 2003. LNCS (LNAI), vol.\u00a02718, pp. 385\u2013390. Springer, Heidelberg (2003)"},{"key":"18_CR3","unstructured":"Berg, A., Spaanenburg, L.: Modular and Hierarchical Specialization in Neural Networks. Journal of Electrical and Electronics Engineering\u00a03(1) (2003)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Jiang, J., Zhang, C., Kamel, M.: Intrusion detection using hierarchical neural networks. Pattern Recognition Letters\u00a026 (2005)","DOI":"10.1016\/j.patrec.2004.09.045"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-540-74819-9_4","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"C. Moraga","year":"2007","unstructured":"Moraga, C.: Design of Neural Networks. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part I. LNCS, vol.\u00a04692, pp. 26\u201333. Springer, Heidelberg (2007)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Almgren, M., Jonsson, E.: Using Active Learning in Intrusion Detection. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop, CSFW 2004 (2004)","DOI":"10.1109\/CSFW.2004.1310734"}],"container-title":["Lecture Notes in Computer Science","Scalability of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02627-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:57:35Z","timestamp":1558382255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02627-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026263","9783642026270"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02627-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}