{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:45:56Z","timestamp":1730195156573,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493603","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T17:37:07Z","timestamp":1209404227000},"page":"686-693","source":"Crossref","is-referenced-by-count":28,"title":["Optimizing Fuzzy K-means for network anomaly detection using PSO"],"prefix":"10.1109","author":[{"given":"Roya","family":"Ensafi","sequence":"first","affiliation":[]},{"given":"Soheila","family":"Dehghanzadeh","sequence":"additional","affiliation":[]},{"given":"Mohammad -R.","family":"Akbarzadeh - T","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"parameter selection in particle swarm optimization","author":"shi","year":"1998","journal-title":"1998 Annual Conference on Evolutionary Programming"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2004.841683"},{"key":"14","article-title":"hide: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification","author":"zhang","year":"2001","journal-title":"Proceedings of the 2nd Annual IEEE Systems Mans Cybernetics Information Assurance Workshop"},{"key":"11","article-title":"evolving fuzzy classifiers for intrusion detection","author":"gomez","year":"2001","journal-title":"Proc Of 2002 IEEE Workshop on Information Assurance"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286428"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2006.1714200"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2004.1437839"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jspi.2007.03.045"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"key":"4","first-page":"221","volume":"146","author":"bandyopadhyay","year":"2002","journal-title":"An evolutionary technique based on K-Means algorithm for optimal clustering in RN"},{"key":"9","first-page":"281","article-title":"some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proceedings of Fifth Berkeley Symposium on Mathematical Statistics and Probability"},{"journal-title":"Swarm Intelligence","year":"2001","key":"8"}],"event":{"name":"2008 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2008,3,31]]},"location":"Doha, Qatar","end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493603.pdf?arnumber=4493603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T17:18:01Z","timestamp":1489684681000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4493603\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493603","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}