{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:11:19Z","timestamp":1725541879449},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106453"},{"type":"electronic","value":"9783642106460"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10646-0_55","type":"book-chapter","created":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T18:25:55Z","timestamp":1260815155000},"page":"455-462","source":"Crossref","is-referenced-by-count":1,"title":["Combining Naive-Bayesian Classifier and Genetic Clustering for Effective Anomaly Based Intrusion Detection"],"prefix":"10.1007","author":[{"given":"S.","family":"Thamaraiselvi","sequence":"first","affiliation":[]},{"given":"R.","family":"Srivathsan","sequence":"additional","affiliation":[]},{"given":"J.","family":"Imayavendhan","sequence":"additional","affiliation":[]},{"given":"Raghavan","family":"Muthuregunathan","sequence":"additional","affiliation":[]},{"given":"S.","family":"Siddharth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"Fries, T.P.: A fuzzy genetic approach for intrusion detection. In: Proceedings of the GECCO conference companion on Genetic and evolutionary computation, pp. 2141\u20132146 (2008)","DOI":"10.1145\/1388969.1389037"},{"key":"55_CR2","unstructured":"Menzies, T., Allen, D., Orrego, A.: Bayesian Anomaly Detection. In: Workshop on Machine Learning Algorithms for Surveillance and Event detection at 23rd ICML, Pittsburgh (2006)"},{"key":"55_CR3","unstructured":"Park, H.-s., Lee, J.-s., Jun, C.-h.: A K-means-like Algorithm for K-medoids Clustering and Its Performance. In: Proceedings of the 36th CIE Conference on Computers and Industrial Engineering, pp. 1222\u20131223 (2006)"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Singhi, S.K., Liu, H.: Feature Subset Selection Bias for Classification Learning. In: Proceedings of the 23rd International Conference on Machine Learning, Pittsburgh (2006)","DOI":"10.1145\/1143844.1143951"},{"issue":"5","key":"55_CR5","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.patcog.2003.09.011","volume":"37","author":"Y. Liu","year":"2004","unstructured":"Liu, Y., Chen, K., Liao, X., Zhang, W.: A Genetic Clustering Method for Intrusion Detection. Pattern Recognition\u00a037(5), 927\u2013942 (2004)","journal-title":"Pattern Recognition"},{"key":"55_CR6","volume-title":"Next Generation Data Mining","author":"L. Ertoz","year":"2004","unstructured":"Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.N., Kumar, V., Srivastava, J., Dokas, P.: MINDS - Minnesota Intrusion Detection System. In: Next Generation Data Mining. MIT Press, Cambridge (2004)"},{"key":"55_CR7","unstructured":"Portnoy, L., Esking, E., Stolfo, S.: Intrusion Detection with Unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security, DMSA 2001 (2001)"},{"key":"55_CR8","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007413511361","volume":"29","author":"P. Domingos","year":"1997","unstructured":"Domingos, P., Pazzani, M.: On the Optimality of the Simple Bayesian Classifier under Zero-One Loss. Machine Learning\u00a029, 103\u2013130 (1997)","journal-title":"Machine Learning"},{"key":"55_CR9","unstructured":"KDDCup 1999 Dataset (1999), \n                    \n                      http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kdd.html"}],"container-title":["Lecture Notes in Computer Science","Rough Sets, Fuzzy Sets, Data Mining and Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10646-0_55.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:37:26Z","timestamp":1619768246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10646-0_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106453","9783642106460"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10646-0_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}