{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T18:29:05Z","timestamp":1761935345832,"version":"build-2065373602"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cec.2004.1330898","type":"proceedings-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T13:50:22Z","timestamp":1096379422000},"page":"502-508","source":"Crossref","is-referenced-by-count":31,"title":["Anomaly detection based on unsupervised niche clustering with application to network intrusion detection"],"prefix":"10.1109","author":[{"given":"E.","family":"Leon","sequence":"first","affiliation":[]},{"given":"O.","family":"Nasraoui","sequence":"additional","affiliation":[]},{"given":"J.","family":"Gomez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Improved niching and encoding strategies for clustering noisy data sets","author":"nasraoui","year":"2004","journal-title":"Proceedings of Genetic And Evolutionary Computation Conference Seattle"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2000.838653"},{"key":"18","article-title":"Unsupervised niche clustering: Discovering an unknown number of clusters in noisy data sets","author":"nasraoui","year":"2004","journal-title":"Evolutionary Computing in Data Mining"},{"key":"15","first-page":"791","volume":"13","author":"jolion","year":"1991","journal-title":"Robust Clustering with Applications in Computer Vision"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.1997.624040"},{"journal-title":"Pattern Classification and Scene Analysis","year":"1973","author":"duda","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/91.227387"},{"key":"11","article-title":"Using artificial anomalies to detect unknown and known network intrusions","author":"fan","year":"2001","journal-title":"Proceedings of the First IEEE International Conference on Data Mining"},{"key":"12","article-title":"Neuro-immune and self-organising map approaches to anomaly detection: A comparison","author":"gonzalez","year":"2002","journal-title":"First International Conference on Artificial Immune Systems"},{"key":"21","article-title":"Crowding and preselection revisited","author":"mahfoud","year":"1992","journal-title":"Proceedings Second Conference Parallel Problem Solving from Nature"},{"key":"20","first-page":"41","article-title":"Genetic algorithms with sharing for multimodal function optimization","author":"goldberg","year":"1987","journal-title":"Proc Second Int l Conf Genetic Algorithms"},{"key":"22","article-title":"A comparison of parallel and sequential niching methods","author":"mahfoud","year":"1995","journal-title":"Proceedings of the Sixth International Conference on Genetic Algorithms"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1996.552320"},{"key":"24","first-page":"445","article-title":"The case against accuracy estimation for comparing induction algorithms","author":"provost","year":"1998","journal-title":"Proceedings of the 24th Intenational Conference on Machine Learning"},{"journal-title":"Data Sets Used for Classification Comparison of Results","year":"0","author":"wlodzislaw","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2001.943782"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347160"},{"key":"3","first-page":"1081","article-title":"An immunogenetic technique to detect anomalies in network traffic","author":"gonzalez","year":"2002","journal-title":"Proceedings of the GECCO-2002 Genetic and Evolutionary Computation Conference"},{"key":"2","first-page":"99","article-title":"Anomaly detection using negative selection based on the r-contiguous matching rule","author":"singh","year":"2002","journal-title":"Proc of the 1st International Conference on Artificial Immune Systems"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775102"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"7","first-page":"43","article-title":"Sequence matching and learning in anomaly detection for computer security","author":"lane","year":"1997","journal-title":"Proc AI Approaches to Fraud Detection and Risk Management"},{"key":"6","first-page":"366","article-title":"An application of machine learning to anomaly detection","author":"lane","year":"1997","journal-title":"Proc 19th NIST-NCSC National Information Systems Security Conf"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"4","first-page":"11","article-title":"A pattern matching model for misuse intrusion detection","author":"kumar","year":"1994","journal-title":"17th National Computer Security Conference"},{"key":"9","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of systems call","author":"hofmeyr","year":"1998","journal-title":"Computer Security"},{"key":"8","first-page":"66","article-title":"Mining audit data to build intrusion detection models","author":"lee","year":"1998","journal-title":"Proc Int l Conf Knowledge Discovery and Data Mining (KDD 98)"}],"event":{"name":"Proceedings of the 2004 Congress on Evolutionary Computation","acronym":"CEC-04","location":"Portland, OR, USA"},"container-title":["Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9256\/29383\/01330898.pdf?arnumber=1330898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T11:32:41Z","timestamp":1533727961000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1330898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cec.2004.1330898","relation":{},"subject":[]}}