{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T22:00:24Z","timestamp":1649109624630},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,12,17]],"date-time":"2008-12-17T00:00:00Z","timestamp":1229472000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s00034-008-9087-y","type":"journal-article","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T18:13:54Z","timestamp":1229451234000},"page":"361-375","source":"Crossref","is-referenced-by-count":1,"title":["Network Intrusion Detection Using a Stochastic Resonance CFAR Technique"],"prefix":"10.1007","volume":"28","author":[{"given":"Di","family":"He","sequence":"first","affiliation":[]},{"given":"Henry","family":"Leung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,12,17]]},"reference":[{"key":"9087_CR1","volume-title":"Nonlinear Dynamics of Chaotic and Stochastic Systems: Tutorial and Modern Developments","author":"V.S. Anishchenko","year":"2002","unstructured":"V.S. Anishchenko, V.V. Astakhov, A.B. Neiman, T.E. Vadivasova, L. Schimansky-Geier, Nonlinear Dynamics of Chaotic and Stochastic Systems: Tutorial and Modern Developments (Springer, Berlin, 2002)"},{"issue":"6","key":"9087_CR2","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1109\/49.611161","volume":"15","author":"P.R. Chang","year":"1997","unstructured":"P.R. Chang, J.T. Hu, Optimal nonlinear adaptive prediction and modeling of MPEG video in ATM networks using pipelined recurrent neural networks. IEEE J. Sel. Areas Commun. 15(6), 1087\u20131100 (1997)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"9087_CR3","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/91.873574","volume":"8","author":"B.S. Chen","year":"2000","unstructured":"B.S. Chen, S.C. Peng, K.C. Wang, Traffic modeling, prediction, and congestion control for high-speed networks: a fuzzy AR approach. IEEE Trans. Fuzzy Syst. 8(5), 491\u2013508 (2000)","journal-title":"IEEE Trans. Fuzzy Syst."},{"issue":"4","key":"9087_CR4","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/3468.935044","volume":"31","author":"R.K. Cunningham","year":"2001","unstructured":"R.K. Cunningham, R.P. Lippmann, S.E. Webster, Detecting and displaying novel computer attacks with Macroscope. IEEE Trans. Syst. Man, Cybern. A 31(4), 275\u2013281 (2001)","journal-title":"IEEE Trans. Syst. Man, Cybern. A"},{"issue":"1\u20132","key":"9087_CR5","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/BF02181487","volume":"87","author":"A.K. Dhara","year":"1997","unstructured":"A.K. Dhara, Enhancement of signal-to-noise ratio. J. Stat. Phys. 87(1\u20132), 251\u2013271 (1997)","journal-title":"J. Stat. Phys."},{"issue":"1","key":"9087_CR6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/38.974517","volume":"22","author":"R.F. Erbacher","year":"2002","unstructured":"R.F. Erbacher, K.L. Walker, D.A. Frincke, Intrusion and misuse detection in large-scale systems. IEEE Comput. Graph. Appl. 22(1), 38\u201347 (2002)","journal-title":"IEEE Comput. Graph. Appl."},{"key":"9087_CR7","volume-title":"Statistical Mechanics of Nonequilibrium Liquids","author":"D.J. Evans","year":"1990","unstructured":"D.J. Evans, G.P. Morriss, Statistical Mechanics of Nonequilibrium Liquids (Academic, London, 1990)"},{"issue":"3","key":"9087_CR8","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1109\/7.784062","volume":"35","author":"K. Gerlach","year":"1999","unstructured":"K. Gerlach, Spatially distributed target detection in non-Gaussian clutter. IEEE Trans. Aerosp. Electron. Syst. 35(3), 926\u2013934 (1999)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"2","key":"9087_CR9","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/19.997828","volume":"51","author":"G.P. Harmer","year":"2002","unstructured":"G.P. Harmer, B.R. Davis, D. Abbott, A review of stochastic resonance: circuits and measurement. IEEE Trans. Instrum. Meas. 51(2), 299\u2013309 (2002)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"9087_CR10","first-page":"589","volume":"4","author":"D. He","year":"2004","unstructured":"D. He, H. Leung, A novel CFAR intrusion detection method using chaotic stochastic resonance. IEEE 2004 Int. Symp. Circuits Syst. Proc. 4, 589\u2013592 (2004)","journal-title":"IEEE 2004 Int. Symp. Circuits Syst. Proc."},{"issue":"12","key":"9087_CR11","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/2.642762","volume":"30","author":"C. Herringshaw","year":"1997","unstructured":"C. Herringshaw, Detecting attacks on networks. Computer 30(12), 16\u201317 (1997)","journal-title":"Computer"},{"issue":"3","key":"9087_CR12","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"K. Ilgun, R.A. Kemmerer, P.A. Porras, State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21(3), 181\u2013199 (1995)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"7","key":"9087_CR13","doi-asserted-by":"crossref","first-page":"1203","DOI":"10.1109\/26.935161","volume":"49","author":"A. Karasaridis","year":"2001","unstructured":"A. Karasaridis, D. Hatzinakos, Network heavy traffic modeling using \u03b1-stable self-similar processes. IEEE Trans. Commun. 49(7), 1203\u20131214 (2001)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"9087_CR14","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MC.2002.1012428","volume":"35","author":"R.A. Kemmerer","year":"2002","unstructured":"R.A. Kemmerer, G. Vigna, Intrusion detection: a brief history and overview. Computer 35(4), 27\u201330 (2002)","journal-title":"Computer"},{"issue":"12","key":"9087_CR15","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/6.887597","volume":"37","author":"S. Kent","year":"2000","unstructured":"S. Kent, On the trail of intrusions into information systems. IEEE Spectr. 37(12), 52\u201356 (2000)","journal-title":"IEEE Spectr."},{"issue":"5","key":"9087_CR16","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/52.605929","volume":"14","author":"A.P. Kosoresow","year":"1997","unstructured":"A.P. Kosoresow, S.A. Hofmeyer, Intrusion detection via system call traces. IEEE Softw. 14(5), 35\u201342 (1997)","journal-title":"IEEE Softw."},{"issue":"4","key":"9087_CR17","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"S.C. Lee","year":"2001","unstructured":"S.C. Lee, D.V. Heinbuch, Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans. Syst. Man Cybern. A 31(4), 294\u2013299 (2001)","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"issue":"5","key":"9087_CR18","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/52.877859","volume":"17","author":"J. McHugh","year":"2000","unstructured":"J. McHugh, A. Christie, J. Allen, Defending yourself: the role of intrusion detection systems. IEEE Softw. 17(5), 42\u201351 (2000)","journal-title":"IEEE Softw."},{"issue":"11","key":"9087_CR19","doi-asserted-by":"crossref","first-page":"2152","DOI":"10.1109\/5.726785","volume":"86","author":"S. Mitaim","year":"1998","unstructured":"S. Mitaim, B. Kosko, Adaptive stochastic resonance. Proc. IEEE 86(11), 2152\u20132183 (1998)","journal-title":"Proc. IEEE"},{"issue":"2","key":"9087_CR20","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1049\/el:20030128","volume":"39","author":"O. Oliaei","year":"2003","unstructured":"O. Oliaei, Stochastic resonance in sigma-delta modulators. Electron. Lett. 39(2), 173\u2013174 (2003)","journal-title":"Electron. Lett."},{"issue":"13","key":"9087_CR21","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1049\/el:20020467","volume":"38","author":"Y. Qiao","year":"2002","unstructured":"Y. Qiao, X.W. Xin, Y. Bin, S. Ge, Anomaly intrusion detection method based on HMM. Electron. Lett. 38(13), 663\u2013664 (2002)","journal-title":"Electron. Lett."},{"issue":"4","key":"9087_CR22","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/69.617059","volume":"9","author":"S.P. Shieh","year":"1997","unstructured":"S.P. Shieh, V.D. Gligor, On a pattern-oriented model for intrusion detection. IEEE Trans. Knowl. Data Eng. 9(4), 661\u2013667 (1997)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"9087_CR23","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1049\/ip-rsn:20000252","volume":"147","author":"R. Srinivasan","year":"2000","unstructured":"R. Srinivasan, Simulation of CFAR detection algorithms for arbitrary clutter distributions. IEE Proc. Radar Sonar Navig. 147(1), 31\u201340 (2000)","journal-title":"IEE Proc. Radar Sonar Navig."},{"issue":"1","key":"9087_CR24","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/JSAC.2002.806130","volume":"21","author":"K.M.C. Tan","year":"2003","unstructured":"K.M.C. Tan, R.A. Maxion, Determining the operational limits of an anomaly-based intrusion detector. IEEE J. Sel. Areas Commun. 21(1), 96\u2013110 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"9087_CR25","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/3468.935043","volume":"31","author":"N. Ye","year":"2001","unstructured":"N. Ye, X.Y. Li, Q. Chen, S.M. Emran, M.M. Xu, Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. Syst. Man Cybern. A 31(4), 266\u2013274 (2001)","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"issue":"7","key":"9087_CR26","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TC.2002.1017701","volume":"51","author":"N. Ye","year":"2002","unstructured":"N. Ye, S.M. Emran, Q. Chen, S. Vilbert, Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 51(7), 810\u2013820 (2002)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"9087_CR27","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/78.738244","volume":"47","author":"S. Zozor","year":"1999","unstructured":"S. Zozor, P.O. Amblard, Stochastic resonance in discrete time nonlinear AR(1) models. IEEE Trans. Signal Process. 47(1), 108\u2013122 (1999)","journal-title":"IEEE Trans. Signal Process."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-008-9087-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-008-9087-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-008-9087-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T15:00:53Z","timestamp":1558537253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-008-9087-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,17]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["9087"],"URL":"https:\/\/doi.org\/10.1007\/s00034-008-9087-y","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,12,17]]}}}