{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:55:01Z","timestamp":1743141301034,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":23,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_61","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"355-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks"],"prefix":"10.1007","author":[{"given":"Ricardo Luis","family":"da Rocha Ataide","sequence":"first","affiliation":[]},{"given":"Zair","family":"Abdelouahab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"61_CR1","unstructured":"AirDefense. Enterprise class wireless intrusion prevention systems: Requirements and figure of merit. Available at http:\/\/www.airdefense.net\/whitepapers\/. Access on November 2007."},{"key":"61_CR2","unstructured":"AirMagnet. Manual do usu\u00e1rio - airmagnet laptop wireless lan analyzer user guide. Available at http:\/\/www.airmagnet.com\/. Access Jul 2008."},{"key":"61_CR3","unstructured":"J. Bellardo and S. Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. Proceedings of the USENIX Security Symposium, August 2003."},{"key":"61_CR4","unstructured":"P. Charles. Jpcap. Available at http:\/\/sourceforge.net\/projects\/jpcap\/."},{"issue":"4","key":"61_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1201\/1086.1065898X\/46353.15.4.20060901\/95121.3","volume":"15","author":"K. Curran","year":"2006","unstructured":"K. Curran and E. Smyth. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks. Information Systems Security, 15(4):17\u201338, Set\/Out 2006.","journal-title":"Information Systems Security"},{"key":"61_CR6","unstructured":"D. Dasgupta, J. G\u00f3mez, F. Gonz\u00e1lez, M. Kaniganti, K. Yallapu, and R. Yarramsetti. MMDS: Multilevel Monitoring and Detection System. Proceedings of the 15th Annual Computer Security Incident Handling Conference."},{"key":"61_CR7","unstructured":"J. L. DeBoer and T. Bruinsma. Airsnare. Available at http:\/\/home.comcast.net\/jay.deboer\/airsnare\/. Access Dec 2007."},{"key":"61_CR8","unstructured":"B. Fenner, G. Harris, and M. Richardson. Libpcap. Available at http:\/\/sourceforge.net\/projects\/libpcap\/. Access Dec 2007."},{"key":"61_CR9","unstructured":"Finisar. Surveyor wireless. Access Jul 2007. Available at http:\/\/investor.finisar.com\/ReleaseDetail.cfm?ReleaseID=89597."},{"key":"61_CR10","unstructured":"S. Haykin. Redes Neurais: Princ\u00edpios e Pr\u00e1tica. Bookman, Porto Alegre, 2 edition, 2001."},{"key":"61_CR11","unstructured":"T. Karygiannis and L. Owens. Wireless network security. Technical Report NIST 800\u201348, National Institute of Standards and Technology, USA, November 2002. Available at http:\/\/csrc.nist.gov\/publications\/nistpubs\/800\u201394\/SP800\u201348.pdf."},{"key":"61_CR12","unstructured":"Kismet. Kismet wireless. Available at http:\/\/www.kismetwireless.net."},{"key":"61_CR13","unstructured":"R. A. Lackey, J. and J. Goddard. Wireless intrusion detection. Technical report, IBM Global Services, 2003."},{"key":"61_CR14","unstructured":"Y. Lim, T. Schmoyer, J. Levine, and H. L. Owen. Wireless Intrusion Detection and Response. Proceedings of the 2003 IEEE Workshop on Information Assurance, March 2003."},{"key":"61_CR15","unstructured":"A. Lockhart. Snort-wireless project. Available at http:\/\/www.snortwireless.org\/. Access Nov 2007."},{"key":"61_CR16","unstructured":"MATLAB. The mathworks - MATLAB and simulink for technical computing. Available at http:\/\/www.mathworks.com\/products\/matlab\/."},{"key":"61_CR17","unstructured":"G. G. Meade. Guidelines for the development and evaluation of IEEE 802.11 intrusion detection systems (IDS)), Technical report, NSA Num I332\u2013005R-2005. 2005"},{"key":"61_CR18","unstructured":"M. Moradi and M. Zulkernine. A Neural Network Based System for Intrusion Detection and Classification of Attacks. Proceedings of 2004 IEEE International Conference on Advances in Intelligent Systems Theory and Applications, page 6, November 2004."},{"key":"61_CR19","unstructured":"D. Pleskonjic. Wireless Intrusion Detection Systems (WIDS). 19th Annual Computer Security Applications Conference, December 2003."},{"key":"61_CR20","unstructured":"Red-M. Taking control of wireless. Available at http:\/\/www.red-m.com\/."},{"key":"61_CR21","unstructured":"T. R. Schmoyer, Y. X. Lim, and H. L. Owen. Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. IEEE Wireless Communications and Networking Conference, March 2004."},{"key":"61_CR22","unstructured":"H. Yang, L. Xie, and J. Sun. Intrusion Detection Solution to WLANs. IEEE 6th CAS Symp. On Emerging Technologies: Mobile and Wireless Comm., June 2004."},{"key":"61_CR23","unstructured":"L. Yanheng, D. Tian, and B. Li. A wireless intrusion detection method based on dynamic growing neural network. 1st International Multi- Symposium on Computer and Computational Sciences, 2006."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T03:02:39Z","timestamp":1676689359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_61","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}