{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:07:03Z","timestamp":1772104023226,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642049200","type":"print"},{"value":"9783642049217","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04921-7_14","type":"book-chapter","created":{"date-parts":[[2009,9,22]],"date-time":"2009-09-22T11:46:25Z","timestamp":1253619985000},"page":"130-139","source":"Crossref","is-referenced-by-count":6,"title":["Network Security Using Growing Hierarchical Self-Organizing Maps"],"prefix":"10.1007","author":[{"given":"E. J.","family":"Palomo","sequence":"first","affiliation":[]},{"given":"E.","family":"Dom\u00ednguez","sequence":"additional","affiliation":[]},{"given":"R. M.","family":"Luque","sequence":"additional","affiliation":[]},{"given":"J.","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF00337288","volume":"43","author":"T. Kohonen","year":"1982","unstructured":"Kohonen, T.: Self-organized formation of topologically correct feature maps. Biological cybernetics\u00a043(1), 59\u201369 (1982)","journal-title":"Biological cybernetics"},{"issue":"6","key":"14_CR2","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TNN.2002.804221","volume":"13","author":"A. Rauber","year":"2002","unstructured":"Rauber, A., Merkl, D., Dittenbach, M.: The growing hierarchical self-organizing map: Exploratory analysis of high-dimensional data. IEEE Transactions on Neural Networks\u00a013(6), 1331\u20131341 (2002)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Lei, J., Ghorbani, A.: Network intrusion detection using an improved competitive learning neural network. In: 2nd Annual Conference on Communication Networks and Services Research, pp. 190\u2013197 (2004)","DOI":"10.1109\/DNSR.2004.1344728"},{"issue":"2","key":"14_CR4","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TSMCB.2005.843274","volume":"35","author":"S. Sarasamma","year":"2005","unstructured":"Sarasamma, S., Zhu, Q., Huff, J.: Hierarchical kohonenen net for anomaly detection in network security. IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics\u00a035(2), 302\u2013312 (2005)","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B-Cybernetics"},{"issue":"4","key":"14_CR5","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O. Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., Ciliz, M.: An intelligent intrusion detection system (ids) for anomaly and misuse detection in computer networks. Expert Systems with Applications\u00a029(4), 713\u2013722 (2005)","journal-title":"Expert Systems with Applications"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D. Denning","year":"1987","unstructured":"Denning, D.: An intrusion-detection model. IEEE Transactions on Software Engineering\u00a0SE-13(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real time data mining-based intrusion detection. In: DARPA Information Survivability Conference & Exposition II, vol.\u00a01, pp. 89\u2013100 (2001)","DOI":"10.1109\/DISCEX.2001.932195"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/12.980003","volume":"51","author":"R. Maxion","year":"2002","unstructured":"Maxion, R., Tan, K.: Anomaly detection in embedded systems. IEEE Transactions on Computers\u00a051(2), 108\u2013120 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"14_CR9","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/JSAC.2002.806130","volume":"21","author":"K. Tan","year":"2003","unstructured":"Tan, K., Maxion, R.: Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communications\u00a021(1), 96\u2013110 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Ying, H., Feng, T.J., Cao, J.K., Ding, X.Q., Zhou, Y.H.: Research on some problems in the kohonen som algorithm. In: International Conference on Machine Learning and Cybernetics, vol.\u00a03, pp. 1279\u20131282 (2002)","DOI":"10.1109\/ICMLC.2002.1167409"},{"key":"14_CR11","unstructured":"Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"},{"key":"14_CR12","unstructured":"Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P.: Cost-based modeling for fraud and intrusion detection: results from the jam project. In: Proceedings of DARPA Information Survivability Conference and Exposition, 2000. DISCEX 2000, vol.\u00a02, pp. 130\u2013144 (2000)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/72.846732","volume":"11","author":"D. Alahakoon","year":"2000","unstructured":"Alahakoon, D., Halgamuge, S., Srinivasan, B.: Dynamic self-organizing maps with controlled growth for knowledge discovery. IEEE Transactions on Neural Networks\u00a011, 601\u2013614 (2000)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Dittenbach, M., Rauber, A., Merkl, D.: Recent advances with the growing hierarchical self-organizing map. In: 3rd Workshop on Self-Organising Maps (WSOM), pp. 140\u2013145 (2001)","DOI":"10.1007\/978-1-4471-0715-6_20"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"DeLooze, L., AF DeLooze, L.: Attack characterization and intrusion detection using an ensemble of self-organizing maps. In: 7th Annual IEEE Information Assurance Workshop, pp. 108\u2013115 (2006)","DOI":"10.1109\/IJCNN.2006.246983"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Douligeris, C.: Detecting denial of service attacks using emergent self-organizing maps. In: 5th IEEE International Symposium on Signal Processing and Information Technology, pp. 375\u2013380 (2005)","DOI":"10.1109\/ISSPIT.2005.1577126"}],"container-title":["Lecture Notes in Computer Science","Adaptive and Natural Computing Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04921-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T08:46:41Z","timestamp":1739350001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04921-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642049200","9783642049217"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04921-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}