{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:08:33Z","timestamp":1772021313981,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/ftdcs.2004.1316613","type":"proceedings-article","created":{"date-parts":[[2004,11,13]],"date-time":"2004-11-13T00:14:14Z","timestamp":1100304854000},"page":"191-197","source":"Crossref","is-referenced-by-count":14,"title":["A fuzzy data mining based intrusion detection model"],"prefix":"10.1109","author":[{"given":"Hai","family":"Jin","sequence":"first","affiliation":[]},{"family":"Jianhua Sun","sequence":"additional","affiliation":[]},{"family":"Hao Chen","sequence":"additional","affiliation":[]},{"family":"Zongfen Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(03)00177-4"},{"key":"17","article-title":"An intrusion alert correlator based on prerequisites of intrusions","author":"ning","year":"2002","journal-title":"Technical Report"},{"key":"18","author":"ross","year":"1995","journal-title":"Fuzzy Logic With Engineering Application"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766909"},{"key":"16","first-page":"673","article-title":"Conceptual clustering with numericand-nominal mixed data - A new similarity based system","author":"li","year":"1998","journal-title":"IEEE Trans on Knowledge and Data Engineering"},{"key":"13","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proc of the Seventh USENIX Security Symposium"},{"key":"14","first-page":"50","article-title":"Learning patterns from unix process execution traces for intrusion detection","author":"lee","year":"1997","journal-title":"Proc of AAAI Workshop AI Approaches to Fraud Detection and Risk Management"},{"key":"11","first-page":"50","article-title":"Evaluation of intrusion detectors: A decision theory approach","author":"g jr","year":"2001","journal-title":"Proc of IEEE Symposium on Security and Privacy"},{"key":"12","author":"kaufmann","year":"1998","journal-title":"Fuzzy Mathematical Models in Engineering and Management Science"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45080-1_91"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775103"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"23","author":"terano","year":"1992","journal-title":"Fuzzy Systems Theory and Its Applications"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"25","author":"xie","year":"2000","journal-title":"Fuzzy Set Theory and Its Applications"},{"key":"3","author":"casella","year":"1990","journal-title":"Statistical Inference"},{"key":"2","author":"canavos","year":"1984","journal-title":"Applied Probability and Statistical Methods"},{"key":"10","article-title":"Neurofuzzy modelling","author":"jantzen","year":"1998","journal-title":"Technical Report"},{"key":"1","first-page":"13","article-title":"Fuzzy data mining and genetic algorithms applied to intrusion detection","author":"bridges","year":"2000","journal-title":"Proc of the Twenty-third National Information Systems Security Conference"},{"key":"7","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2002.1018103"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2000.877441"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004372"},{"key":"9","year":"0"},{"key":"8","year":"0"}],"event":{"name":"10th IEEE International Workshop on Future Trends of Distributed Computing Systems","location":"Suzhou, China","start":{"date-parts":[[2004,5,28]]},"end":{"date-parts":[[2004,5,28]]}},"container-title":["Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9202\/29177\/01316613.pdf?arnumber=1316613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,12]],"date-time":"2022-02-12T00:59:07Z","timestamp":1644627547000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1316613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ftdcs.2004.1316613","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}