{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:04Z","timestamp":1725790984744},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_39","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"396-404","source":"Crossref","is-referenced-by-count":2,"title":["LDFGB Algorithm for Anomaly Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Shang-nan","family":"Yin","sequence":"first","affiliation":[]},{"given":"Zhi-guo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sung-Ryul","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"http:\/\/www.sans.org\/reading_room\/whitepapers\/detection\/understanding-intrusion-detection-systems_337"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An intrusion-detection model. In: IEEE Computer Society Symposium on Research Security and Privacy, pp. 118\u2013131 (1987)","DOI":"10.1109\/SP.1986.10010"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Network Support for IP traceback. IEEE\/ACM Transactions on Networking, 226\u2013237 (2001)","DOI":"10.1109\/90.929847"},{"issue":"3","key":"39_CR4","first-page":"1081","volume":"6","author":"D. Dasgupta","year":"2002","unstructured":"Dasgupta, D., Gonzalez, F.: An Immunity-Based Technique to Characterize Intrusions in Computer Networks. IEEE Trans. Evol. Comput.\u00a06(3), 1081\u20131088 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"39_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316801","volume-title":"Finding groups in data: an introduction to cluster analysis","author":"L. Kaufan","year":"1990","unstructured":"Kaufan, L., Rousseeuw, P.J.: Finding groups in data: an introduction to cluster analysis. John Wiley & Sons, New York (1990)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Ni, L., Zheng, H.-Y.: An unsupervised intrusion detection method combined clustering with chaos simulated annealing. In: Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, vol. 1922 (August 2007)","DOI":"10.1109\/ICMLC.2007.4370702"},{"key":"39_CR7","unstructured":"Guohui, W., Guoyuan, L.: Intrusion detection method based on graph clustering algorithm. Journal of Computer Applications, 1888\u20131900 (July 2011)"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Mingqiang, Z., Hui, H., Qian, W.: A Graph-based Clustering Algorithm Intrusion Detection. In: The 7th International Conference on Computer Science & Education (ICCSE), pp. 1311\u20131314 (2012)","DOI":"10.1109\/ICCSE.2012.6295306"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T12:37:45Z","timestamp":1558874265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}