{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:51:01Z","timestamp":1729644661622,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cscwd.2013.6580983","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:12:13Z","timestamp":1377709933000},"page":"325-331","source":"Crossref","is-referenced-by-count":0,"title":["A cooperative intrusion detection model based on granular computing"],"prefix":"10.1109","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shaohua","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Xiufen","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Jihui","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Haibin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2004.839657"},{"key":"17","first-page":"810","article-title":"Principle of granularity in clustering and classification","volume":"25","author":"bu","year":"2002","journal-title":"Chinese Journal of Computers"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/72.846737"},{"key":"15","first-page":"86","article-title":"A granular computing model based on tolerance relation","volume":"12","author":"wang","year":"2005","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"16","first-page":"1335","article-title":"Granular computing in incomplete information systems","volume":"26","author":"hu","year":"2005","journal-title":"Mini-Micro Systems"},{"key":"13","first-page":"36","article-title":"Study on incompatibility problems solving based on extension theory","volume":"9","author":"yang","year":"2007","journal-title":"Engineering Science"},{"key":"14","first-page":"48","article-title":"The calculation of knowledge granulation and its application","volume":"22","author":"miao","year":"2002","journal-title":"Systems Engineering-theory & Practice"},{"key":"11","first-page":"1","article-title":"Quotient space theory and granule computing","volume":"30","author":"zhang","year":"2003","journal-title":"Computer Science"},{"journal-title":"The Theory and Application on Problem-Solving Quotient Space and Granule Computing","year":"2007","author":"zhang","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2006.1635750"},{"key":"20","first-page":"960","article-title":"Application of granular computing to artificial neural network","volume":"34","author":"li","year":"2006","journal-title":"Journal of Tongji University (Natural Science)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2006.1635922"},{"key":"23","first-page":"1911","article-title":"Anomaly intrusion detection based on quotient space granularity clustering","volume":"27","author":"wang","year":"2010","journal-title":"Application Research of Computers"},{"key":"24","first-page":"475","article-title":"A cooperative network intrusion detection based on fuzzy SVMs","volume":"5","author":"teng","year":"2010","journal-title":"Journal of Networks"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.008"},{"key":"26","first-page":"287","article-title":"The detecting method of scanning ports","volume":"23","author":"tang","year":"2003","journal-title":"Journal of Computer Applications"},{"journal-title":"Snort 2 0 intrusion detection","year":"2004","author":"caswell","key":"27"},{"key":"28","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/978-3-540-92719-8_38","article-title":"Cooperative intrusion detection model based on state transition analysis","volume":"5236","author":"teng","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2009924"},{"journal-title":"Maximum Security (Third Edition)","year":"2003","key":"3"},{"key":"2","first-page":"8","article-title":"An overview of granular computing","volume":"2","author":"wang","year":"2007","journal-title":"CAAL Transaction on Intelligent System"},{"key":"10","first-page":"546","article-title":"Granules and application of granular computing in logical reasoning","volume":"41","author":"liu","year":"2004","journal-title":"Journal of Computer research and development"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2008.4664800"},{"key":"7","first-page":"16","article-title":"Three perspectives of granular computing","volume":"25","author":"yao","year":"2006","journal-title":"Journal of Nanchang Institute of Technology"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1117\/12.669023","article-title":"Granular computing for data mining","author":"yao","year":"2006","journal-title":"Proceedings of SPIE Conference on Data Mining Intrusion Detection Information Assurance and Data Networks Security"},{"key":"5","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/978-3-540-27794-1_11","article-title":"A partition model of granular computing","author":"yao","year":"2004","journal-title":"LNCS Transactions on Rough Sets"},{"key":"4","article-title":"A study on object-monitoring-based distributed and collaborative intrusion detection","author":"teng","year":"2008","journal-title":"Dissertation for the degree of Doctor of Philosophy"},{"key":"9","first-page":"865","article-title":"G-logic and resolution reasoning","volume":"27","author":"liu","year":"2004","journal-title":"Chinese Journal of Computers"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200101)16:1<57::AID-INT6>3.0.CO;2-Y"}],"event":{"name":"2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","start":{"date-parts":[[2013,6,27]]},"location":"Whistler, BC, Canada","end":{"date-parts":[[2013,6,29]]}},"container-title":["Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6573246\/6580921\/06580983.pdf?arnumber=6580983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T09:23:23Z","timestamp":1563787403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6580983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2013.6580983","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}