{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T22:02:06Z","timestamp":1747778526279,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cimca.2005.1631456","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T16:26:01Z","timestamp":1148574361000},"page":"123-130","source":"Crossref","is-referenced-by-count":9,"title":["Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection"],"prefix":"10.1109","volume":"2","author":[{"given":"S.","family":"Albayrak","sequence":"first","affiliation":[]},{"given":"C.","family":"Scheel","sequence":"additional","affiliation":[]},{"given":"D.","family":"Milosevic","sequence":"additional","affiliation":[]},{"given":"A.","family":"Muller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"384","article-title":"Uncovering the hierarchical structure of text archives by using an unsupervised neural network with adaptive architecture","author":"merkl","year":"2000","journal-title":"Data Mining and Knowledge Discovery"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2000","author":"schneier","key":"22"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","article-title":"Self-Organizing Maps","volume":"30","author":"kohonen","year":"1995","journal-title":"Springer Series in Information Sciences"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967988"},{"year":"0","key":"18"},{"key":"15","first-page":"940","article-title":"Fast winner search for som-based monitoring and retrieval of high-dimensional data","volume":"2","author":"kaski","year":"1999","journal-title":"IEE conference publication"},{"article-title":"Self-organized formation of generalized topological maps of observations in a physical system","year":"1981","author":"kohonen","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250905"},{"key":"14","first-page":"239","article-title":"The characteristics of the torus self-organizing map","author":"ito","year":"2000","journal-title":"6 th International COnference on Soft Computing IIZUKA2000 Iizuka Fukuoka Japan October 1-4 2000"},{"journal-title":"Anomaly detection using real-valued negative selection","year":"2003","author":"gonzalez","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-72087-1_27"},{"key":"21","first-page":"81","article-title":"A scalable self-organizing map algorithm for textual classification: A neural network approach to thesaurus generation","volume":"15","author":"roussinov","year":"1998","journal-title":"CC-AI The Journal for the Integrated Study of Artificial Intelligence"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159030"},{"year":"0","key":"20"},{"key":"2","first-page":"539","article-title":"Resource and job aware coordination in multi agent filtering framework","author":"albayrak","year":"2005","journal-title":"Artificial Intelligence And Applications (AIA 2005) 23rd IASTED International Multi-Conference on Applied Informatics"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2005.1527937"},{"journal-title":"A study of Artificial Immune Systems Applied to Anomaly Detection","year":"2003","author":"gonzalez","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"6","volume":"12","author":"erwin","year":"2002","journal-title":"Csem02 - lecture"},{"key":"5","article-title":"Speeding up algorithms of SOM family for large and high dimensional databases","author":"cuadros-vargas","year":"2003","journal-title":"Proc Workshop Self-Organizing Maps"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1006\/jvci.1996.0008"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/BF02332159"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1991.155390"}],"event":{"name":"International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)","location":"Vienna, Austria"},"container-title":["International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10869\/34212\/01631456.pdf?arnumber=1631456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T02:02:07Z","timestamp":1497664927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1631456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cimca.2005.1631456","relation":{},"subject":[]}}