{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T09:44:00Z","timestamp":1745833440236,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fuzz.2003.1206607","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"1231-1236","source":"Crossref","is-referenced-by-count":40,"title":["Detecting denial of service attacks using support vector machines"],"prefix":"10.1109","volume":"2","author":[{"given":"S.","family":"Mukkamala","sequence":"first","affiliation":[]},{"given":"A.H.","family":"Sung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref32","article-title":"Distributed Denial of Service Characterization","author":"draelos","year":"2003","journal-title":"Sandia National Laboratories Report"},{"year":"1998","author":"webster","article-title":"The Development and Analysis of Intrusion Detection Algorithms","key":"ref31"},{"year":"1998","author":"kendall","article-title":"A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/S0957-4174(98)00041-4"},{"key":"ref35","article-title":"SVMlight is an Implementation of Support Vector Machines (SVMs) in C","author":"joachims","year":"2000","journal-title":"University of Dortmund Collaborative Research Center on 'Complexity Reduction in Multivariate Data (SFB475)"},{"key":"ref34","article-title":"Estimating the Generalization Performance of a SVM Efficiently","author":"joachims","year":"2000","journal-title":"Proceedings of the International Conference on Machine Learning"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/RISP.1990.63859"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CAIA.1990.89167"},{"key":"ref12","first-page":"1153","article-title":"Computer Security","author":"kemmerer","year":"1994","journal-title":"Encyclopedia of Software Engineering"},{"key":"ref13","article-title":"Reconciling Application and Kernel Logs","author":"bishop","year":"0","journal-title":"Deliverable report for DoE Lawrence Livermore National Laboratory Project W-7S05-Eng-48"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/332159.332161"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/SECPRI.1996.502675"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CAIA.1990.89167"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/IJCNN.1992.226942"},{"key":"ref18","article-title":"Intrusion Detection with Neural Networks","author":"ryan","year":"1998","journal-title":"Advances in Neural Information Processing Systems 10"},{"key":"ref19","article-title":"Artificial Neural Networks for Misuse Detection","author":"cannady","year":"1998","journal-title":"National Information Systems Security Conference"},{"key":"ref28","article-title":"Audit Data Reduction Using Neural Networks and Support Vector Machines","author":"mukkamala","year":"2002","journal-title":"Digital Forensics Res Workshop (DFRWS)"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TSE.1987.232889","article-title":"views for multilevel database security","volume":"se 13","author":"denning","year":"1987","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref27","article-title":"Data Mining Approaches for Intrusion Detection","author":"lee","year":"1998","journal-title":"7th USENIX Security Symposium 1998"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/0167-4048(93)90029-5"},{"year":"1995","author":"kumar","article-title":"Classification and Detection of Computer Intrusions","key":"ref6"},{"key":"ref29","article-title":"Identifying Key Features for Intrusion Detection Using Neural Networks","author":"mukkamala","year":"2002","journal-title":"Proceedings of ICCC International Conference on Computer Communications 2002"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X","article-title":"Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection","volume":"15","author":"jianxiong","year":"2000","journal-title":"International Journal of Intelligent Systems"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/RISP.1993.287646"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/CCST.1994.363774"},{"key":"ref2","article-title":"Hackers - Heroes of the Computer Revolution","author":"levy","year":"1984","journal-title":"Dell"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/65.283931"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.7249\/R609-1","article-title":"Security Controls for Computer Systems","author":"ware","year":"1979","journal-title":"Report of Defense Science Board Task Force on Computer Security"},{"key":"ref20","article-title":"Learning Program Behavior Profiles for Intrusion Detection","author":"ghosh","year":"1999","journal-title":"USENIX"},{"key":"ref22","article-title":"Defending a Computer System Using Autonomous Agents","author":"crosbie","year":"0","journal-title":"Technical Report CSD-TR-95-022"},{"key":"ref21","first-page":"139","article-title":"Monitoring Information System Security","author":"mukkamal","year":"2001","journal-title":"Proc 11th Workshop on Information Technologies and Systems"},{"key":"ref24","article-title":"Immunity-Based Intrusion Detection System: A general Framework","author":"dasgupta","year":"1999","journal-title":"22ndNational Information Security Conference"},{"key":"ref23","article-title":"Agent-Based Distributed Learning Applied to Fraud Detection","author":"prodromidis","year":"0","journal-title":"Technical Report CUCS-014-99"},{"key":"ref26","article-title":"Mining Audit Data to Build Intrusion Detection Models","author":"lee","year":"1998","journal-title":"Proc KDD-98 honorable mention best application paper"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/IJCNN.2002.1007774"}],"event":{"acronym":"FUZZY-03","name":"12th International Fuzzy Systems Conference","location":"St Louis, MO, USA"},"container-title":["The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8573\/27148\/01206607.pdf?arnumber=1206607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T04:35:20Z","timestamp":1585629320000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/fuzz.2003.1206607","relation":{},"subject":[]}}