{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:40:56Z","timestamp":1742982056707,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":19,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_21","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"129-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Intrusion Detection and Classification of Attacks in High-Level Network Protocols Using Recurrent Neural Networks"],"prefix":"10.1007","author":[{"given":"Vicente","family":"Alarcon-Aquino","sequence":"first","affiliation":[]},{"given":"Carlos A.","family":"Oropeza-Clavel","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Rodriguez-Asomoza","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Starostenko","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Rosas-Romero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"unstructured":"R. P. Lippmann, An Introduction to Computing with Neural Nets, in Neural Networks: Theoretical Foundations and Analysis, Edited by Clifford Lau, IEEE Press, 1992.","key":"21_CR1"},{"key":"21_CR2","first-page":"64","volume-title":"Artificial Neural Networks: Paradigms, Applications, and Hardware Implementations","author":"C. Lau","year":"1992","unstructured":"C. Lau, Artificial Neural Networks: Paradigms, Applications, and Hardware Implementations. IEEE Press, New Jersey. 1992. pp. 64- 90"},{"doi-asserted-by":"crossref","unstructured":"B. Widrow, 30 Years of Adaptative Neural Networks:Perceptron, Madaline, and Backpropagation. Proc. IEEE, Vol. 78. 1990.","key":"21_CR3","DOI":"10.1109\/5.58323"},{"key":"21_CR4","first-page":"12","volume-title":"An Introduction to Neural Networks","author":"J.A. Anderson","year":"1997","unstructured":"J. A. Anderson, An Introduction to Neural Networks. MIT Press, Cambridge, Massachusetts. 1997. pp. 12 - 52"},{"unstructured":"S. Haykin, Neural Networks. Prentice Hall, 1998. pp. 274 - 298","key":"21_CR5"},{"unstructured":"V. Alarcon-Aquino, J.A. Mej\u00eda S\u00e1nchez, R. Rosas-Romero, J.F. Ram\u00edrez-Cruz., Detecting and Classifying Attacks in Computer Networks Using Feed-forward and Elman Neural Networks. Proceedings of the 1st European Conference on Computer Network Defense, EC2ND 2005, Wales, Uk. Springer Verlag 2005.","key":"21_CR6"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TSMCC.2004.843217","volume":"36","author":"V. Alarcon-Aquino","year":"2006","unstructured":"V. Alarcon-Aquino, J. A. Barria, Multi-resolution FIR Neural-Network-Based Learning Algorithm Applied to Network Traffic Prediction, IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Review, Vol. 36, Issue No. 2, March 2006. pp. 208-220","journal-title":"IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Review"},{"key":"21_CR8","volume-title":"Sistema Inmunol\u00f3gico para la Detecci\u00f3n de Intrusos a Nivel de Protocolo HTTP","author":"E. Torres","year":"2003","unstructured":"E. Torres, Sistema Inmunol\u00f3gico para la Detecci\u00f3n de Intrusos a Nivel de Protocolo HTTP. Pontificia Universidad Javeriana, Bogot\u00e1, Colombia 2003."},{"unstructured":"Digital Security of the Future S21SEC URL http:\/\/www.s21sec.com.","key":"21_CR9"},{"unstructured":"P. Inella, The Evolution of Intrusion Detection Systems, Tetrad Digital Integrity, LLC. EE.UU., 2001. pp. 1 - 15","key":"21_CR10"},{"unstructured":"M. Embrechts, MetaNeural\n              \n                tm\n               \u2013 Hands-on. Rensselaer Polytechnic Institute, Troy NY. 1993. pp. 1- 5, 8 - 13","key":"21_CR11"},{"key":"21_CR12","first-page":"1","volume-title":"Gradient-Based Learning Algorithm for Recurrent Connectionist Networks","author":"J. Willams","year":"1990","unstructured":"J. Willams, D. Zipser, Gradient-Based Learning Algorithm for Recurrent Connectionist Networks. La Jolla, CA Press. California, 1990. pp 1-5"},{"key":"21_CR13","first-page":"1","volume-title":"On the improvement of the Real-Time Recurrent Learning Algorithm for Recurrent Neural Networks","author":"M. Mak","year":"1998","unstructured":"M. Mak, K. Ku, Y. Lu, On the improvement of the Real-Time Recurrent Learning Algorithm for Recurrent Neural Networks, Department of Electronic Engineering, Hong Kong Polytechnic University, Hong Kong, 1998. pp. 1- 4"},{"key":"21_CR14","first-page":"1","volume-title":"Application of A Fast Real Time Recurrent Learning Algorithm to Text-to-Phoneme Conversion","author":"M. Mak","year":"1995","unstructured":"M. Mak, Application of A Fast Real Time Recurrent Learning Algorithm to Text-to-Phoneme Conversion, Department. of Electronic Engineering, Hong Kong Polytechnic University, Hong Kong, 1995. pp. 1- 5"},{"key":"21_CR15","series-title":"Intelligent Engineering Systems through Artificial Neural Networks, Proc. Of ANNIE-2002, vol. 12","first-page":"579","volume-title":"Network-Based Intrusion Detection Using Neural Networks","author":"A. Bivens","year":"2002","unstructured":"A. Bivens, C. Palagiri, R. Smith, B. Szymanski, and M. Embrechts, Network-Based Intrusion Detection Using Neural Networks, Intelligent Engineering Systems through Artificial Neural Networks, Proc. Of ANNIE-2002, vol. 12, ASME Press, New York, 2002 pp. 579-584."},{"doi-asserted-by":"crossref","unstructured":"C. Manikopoulos, C. and S. Papavassiliou, Network Intrusion and Fault Detection: A Statistical Anomaly Approach, IEEE Communications Magazine, October 2002, pp. 76-82.","key":"21_CR16","DOI":"10.1109\/MCOM.2002.1039860"},{"unstructured":"J. P. Planquart, Application of Neural Networks to Intrusion Detection, SANS Institute, July 2001.","key":"21_CR17"},{"unstructured":"W. Lisheng, X. Zongben, Sufficient and Neural Networks, IEEE Transactions on Circuits and Systems I, Vol. 5, Issue 6, June 2006.","key":"21_CR18"},{"doi-asserted-by":"crossref","unstructured":"V. Alarcon-Aquino, J. A. Barria, Anomaly Detection in Communication Networks Using Wavelets, IEE-Proceedings-Communications, Vol.148, No.6; Dec. 2001; p.355-362","key":"21_CR19","DOI":"10.1049\/ip-com:20010659"}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T21:09:15Z","timestamp":1674076155000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_21","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}