{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:43:01Z","timestamp":1725702181845},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_3","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"23-34","source":"Crossref","is-referenced-by-count":1,"title":["Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Nelcileno","family":"Ara\u00fajo","sequence":"first","affiliation":[]},{"given":"Ruy","family":"de Oliveira","sequence":"additional","affiliation":[]},{"given":"Ed\u2019 Wilson Tavares","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Valtemir","family":"Nascimento","sequence":"additional","affiliation":[]},{"given":"Ailton Shinoda","family":"Akira","sequence":"additional","affiliation":[]},{"given":"Bharat","family":"Bhargava","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Souza, P.: Study about anomaly based intrusion detection systems: an approach using neural networks. M.Sc. Thesis, Salvador University\/Salvador (2008)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Vilakazi, C.B., Marwala, T.: Application of feature selection and fuzzy ARTMAP to intrusion detection. In: Proceedings of 2006 IEEE International Conference on Systems, Man and Cybernetics, pp. 4880\u20134885 (2006)","DOI":"10.1109\/ICSMC.2006.385078"},{"issue":"5","key":"3_CR3","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1109\/72.159059","volume":"3","author":"G.A. Carpenter","year":"1992","unstructured":"Carpenter, G.A., Grossberg, S., Markuzon, N., Reynold, J.H., Rosen, D.B.: Fuzzy ARTMAP: A neural network for incremental supervised learning of analog multidimensional maps. IEEE Transactions on Neural Network\u00a03(5), 689\u2013713 (1992)","journal-title":"IEEE Transactions on Neural Network"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"S. Wu","year":"2010","unstructured":"Wu, S., Banzhaf, W.: The Use of Computational Intelligence in Intrusion Detection Systems: A Review. Applied Soft Computing\u00a010, 1\u201335 (2010)","journal-title":"Applied Soft Computing"},{"issue":"12","key":"3_CR5","first-page":"1830","volume":"5","author":"I. Ahmad","year":"2010","unstructured":"Ahmad, I., Abdullah, A., Alghamdi, A.: Towards the selection of best neural network system for intrusion detection. International Journal of the Physical Sciences\u00a05(12), 1830\u20131839 (2010)","journal-title":"International Journal of the Physical Sciences"},{"issue":"4","key":"3_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5120\/4809-7002","volume":"39","author":"A.K. Santra","year":"2012","unstructured":"Santra, A.K., Nagarajan, S., Jinesh, V.N.: Intrusion Detection in Wireless Networks using FUZZY Nerural Networks adn Dynamic Context-Aware Role based Access Control Security (DCARBAC). Int. Journal of Computer Application\u00a039(4), 23\u201331 (2012)","journal-title":"Int. Journal of Computer Application"},{"issue":"1","key":"3_CR7","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/0893-6080(91)90056-B","volume":"4","author":"G.A. Carpenter","year":"1991","unstructured":"Carpenter, G.A., Grossberg, S., Rosen, D.B.: Fuzzy ART: fast stable learning and categorization of analog patterns by an adaptive resonance system. Neural Networks\u00a04(1), 759\u2013771 (1991)","journal-title":"Neural Networks"},{"issue":"4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks\u00a034(4), 579\u2013595 (2000)","journal-title":"Computer Networks"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Ara\u00fajo, N., Shinoda, A.A., de Oliveira, R., Ferreira, E.T.: Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach. In: Proceedings of 2010 IEEE International Conference on Telecommunications, pp. 552\u2013558 (2010)","DOI":"10.1109\/ICTEL.2010.5478852"},{"key":"3_CR10","unstructured":"Malange, F.C.V.: A neuro-fuzzy-wavelet network to detect voltage anomalies in electric power systems. D.Sc. Thesis. Universidade Estadual J\u00falio de Mesquita Filho\/Ilha Solteira (2010)"},{"key":"3_CR11","unstructured":"Bouckaert, R.R., et al.: WEKA manual for version 3-7-0, \n                    \n                      http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/\n                    \n                    \n                   (last access: August 2009)"},{"key":"3_CR12","unstructured":"Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, vol.\u00a012, pp. 15\u201328 (2003)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Bittau, A., Handley, M., Lackey, J.: The Final Nail in WEP\u2019s Coffin. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 386\u2013400 (2006)","DOI":"10.1109\/SP.2006.40"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T09:25:20Z","timestamp":1557221120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}