{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:23:25Z","timestamp":1725560605439},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642144776"},{"type":"electronic","value":"9783642144783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14478-3_25","type":"book-chapter","created":{"date-parts":[[2010,7,23]],"date-time":"2010-07-23T16:56:16Z","timestamp":1279904176000},"page":"242-252","source":"Crossref","is-referenced-by-count":4,"title":["Detection and Classification of DDoS Attacks Using Fuzzy Inference System"],"prefix":"10.1007","author":[{"given":"T.","family":"Subbulakshmi","sequence":"first","affiliation":[]},{"given":"S.","family":"Mercy Shalinie","sequence":"additional","affiliation":[]},{"given":"C.","family":"Suneel Reddy","sequence":"additional","affiliation":[]},{"given":"A.","family":"Ramamoorthi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.istr.2005.07.001","volume":"10","author":"T. Pietraszek","year":"2005","unstructured":"Pietraszek, T., Tanner, A.: Data mining and machine learning-Towards reducing false positives in intrusion detection. Information Security Technical Report\u00a010, 169\u2013183 (2005)","journal-title":"Information Security Technical Report"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1007\/978-3-540-30143-1_6","volume-title":"Recent Advances in Intrusion Detection","author":"T. Pietraszek","year":"2004","unstructured":"Pietraszek, T.: Using adaptive alert classification to reduce false positives in intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol.\u00a03224, pp. 102\u2013124. Springer, Heidelberg (2004)"},{"key":"25_CR3","volume-title":"Using alert verification to identify successful intrusion attaempts","author":"C. Kruegel","year":"2004","unstructured":"Kruegel, C., Robertson, W., Vigna, G.: Using alert verification to identify successful intrusion attaempts. K.G. Saur Verlag, Munchen (2004)"},{"issue":"2","key":"25_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/S0164-1212(01)00088-7","volume":"60","author":"G. Helmer","year":"2002","unstructured":"Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Automated discovery of concise predictive rules for intrusion detection. The Journal of Systems and Software\u00a060(2), 165\u2013175 (2002)","journal-title":"The Journal of Systems and Software"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-45474-8_6","volume-title":"Recent Advances in Intrusion Detection","author":"H. Debar","year":"2001","unstructured":"Debar, H., Wespi, A.: Aggregation and correlation of intrusion detection alerts. In: Lee, W., M\u00e9, L., Wespi, A. (eds.) RAID 2001. LNCS, vol.\u00a02212, pp. 85\u2013103. Springer, Heidelberg (2001)"},{"key":"25_CR6","unstructured":"Lee, W.: A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems, PhD thesis, Columbia University (1999)"},{"key":"25_CR7","first-page":"115","volume-title":"Proceedings of the 12th International Conference on Machine Learning","author":"W.W. Cohen","year":"1995","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Prieditis, A., Russell, S. (eds.) Proceedings of the 12th International Conference on Machine Learning, Tahoe City, CA, pp. 115\u2013123. Morgan Kaufmann Publishers, San Francisco (1995)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Howard, J.D., Longstaff, T.A.: A common language for computer security incidents, Technical report, CERT (1998)","DOI":"10.2172\/751004"},{"key":"25_CR9","first-page":"115","volume-title":"Proceedings of the 12th International Conference on Machine Learning","author":"W.W. Cohen","year":"1995","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Prieditis, A., Russell, S. (eds.) Proceedings of the 12th International Conference on Machine Learning, Tahoe City, CA, pp. 115\u2013123. Morgan Kaufmann Publishers, San Francisco (1995)"},{"issue":"2","key":"25_CR10","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/S0164-1212(01)00088-7","volume":"60","author":"G. Helmer","year":"2002","unstructured":"Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Automated discovery of concise predictive rules for intrusion detection. The Journal of Systems and Software\u00a060(2), 165\u2013175 (2002)","journal-title":"The Journal of Systems and Software"},{"key":"25_CR11","unstructured":"Gomez, J., Dasgupta, D.: Evolving Fuzzy Classifiers for Intrusion Detection. In: Proceedings of the 2002 IEEE Workshop on Information Assurance (2002)"},{"key":"25_CR12","volume-title":"Proceedings of IEEE International Conference on Computing and Informatics","author":"A.N. Toosi","year":"2006","unstructured":"Toosi, A.N., Kahani, M., Monsefi, R.: Network Intrusion Detection Based on Neuro-Fuzzy Classification. In: Proceedings of IEEE International Conference on Computing and Informatics. IEEE, Los Alamitos (2006)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Network Security and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14478-3_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:53:23Z","timestamp":1606186403000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14478-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642144776","9783642144783"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14478-3_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}