{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:52:40Z","timestamp":1725699160645},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642327100"},{"type":"electronic","value":"9783642327117"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32711-7_14","type":"book-chapter","created":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T12:17:23Z","timestamp":1344601043000},"page":"155-162","source":"Crossref","is-referenced-by-count":2,"title":["Monitoring of a Large Wi-Fi Hotspots Network: Performance Investigation of Soft Computing Techniques"],"prefix":"10.1007","author":[{"given":"Pheeha","family":"Machaka","sequence":"first","affiliation":[]},{"given":"Takudzwa","family":"Mabande","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Bagula","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MC.2003.1212682","volume":"36","author":"S.J. Vaughan-Nichols","year":"2003","unstructured":"Vaughan-Nichols, S.J.: The challenge of wi-fi roaming. Computer\u00a036, 17\u201319 (2003)","journal-title":"Computer"},{"key":"14_CR2","unstructured":"Cannady, J.: Artificial neural networks for misuse detection. In: Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, USA (1998)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/11534310_51","volume-title":"Networking and Mobile Computing","author":"E. Cheng","year":"2005","unstructured":"Cheng, E., Jin, H., Han, Z., Sun, J.: Network-Based Anomaly Detection Using an Elman Network. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol.\u00a03619, pp. 471\u2013480. Springer, Heidelberg (2005)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, J., Zulkernine, M.: Anomaly based network intrusion detection with unsupervised outlier detection. In: ICC 2006, Instanbul, vol.\u00a09 (2006)","DOI":"10.1109\/ICC.2006.255127"},{"key":"14_CR5","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: 1996 Proceedings of IEEE Symposium on Security and Privacy (1996)"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TEVC.2002.1011541","volume":"6","author":"D. Dasgupta","year":"2002","unstructured":"Dasgupta, D., Gonzalez, F.: An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation\u00a06, 281\u2013291 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.: A cooperative AIS framework for intrusion detection. In: 2007 IEEE International Conference on Communications (2007)","DOI":"10.1109\/ICC.2007.237"},{"key":"14_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-74827-4_18","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"B. Cha","year":"2007","unstructured":"Cha, B., Lee, D.: Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol.\u00a04693, pp. 141\u2013148. Springer, Heidelberg (2007)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Dunne, R.A.: A statistical Approach to Neural Network for Pattern Recognition, p. 288. Wiley-Interscience (2007)","DOI":"10.1002\/9780470148150"},{"key":"14_CR10","unstructured":"Kjaerulff, U.B., Madsen, A.L.: Bayesian Networks and Influence Diagrams: Guide To Construction and Analysis, 1st edn., p. 336. Springer (2007)"},{"key":"14_CR11","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann Series in Data Management Systems, p. 560. Morgan Kaufmann (2005)"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/B:GENP.0000030197.83685.94","volume":"5","author":"A. Watkins","year":"2004","unstructured":"Watkins, A., Timmis, J., Boggess, L.: Artificial immune recognition system (AIRS): An immune-inspired supervised learning algorithm. Genetic Programming and Evolvable Machines\u00a05, 291\u2013317 (2004)","journal-title":"Genetic Programming and Evolvable Machines"},{"key":"14_CR13","first-page":"339","volume-title":"Simulation: The Practice of Model Development and Use","author":"S. Robinson","year":"2004","unstructured":"Robinson, S.: Simulation: The Practice of Model Development and Use, 1st edn., p. 339. John Wiley & Sons Ltd., The Atrium (2004)","edition":"1"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Bio-Inspired Models of Networks, Information, and Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32711-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T00:20:20Z","timestamp":1557188420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32711-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642327100","9783642327117"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32711-7_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}