{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T07:21:50Z","timestamp":1745133710912,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fuzz.2003.1206614","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T14:34:28Z","timestamp":1079966068000},"page":"1274-1278","source":"Crossref","is-referenced-by-count":40,"title":["Fuzzy clustering for intrusion detection"],"prefix":"10.1109","volume":"2","author":[{"given":"H.","family":"Shah","sequence":"first","affiliation":[]},{"given":"J.","family":"Undercoffer","sequence":"additional","affiliation":[]},{"given":"A.","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50024-4"},{"key":"ref11","article-title":"Mining Audit Data to build Intrusion Detection Models","author":"wenke","year":"1998","journal-title":"Proc KDD-98"},{"key":"ref12","article-title":"Data Mining for Network Intrusion Detection","author":"dokas","year":"2002","journal-title":"Next Generation Data Mining"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2001.943772"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"ref15","article-title":"LAPACK User's Guide","author":"anderson","year":"1999","journal-title":"Society for Industrial and Applied Mathematics"},{"journal-title":"Matrix Computations","year":"1989","author":"golub","key":"ref16"},{"year":"0","key":"ref17"},{"journal-title":"Mitre Common Vulnerabilities Index Can-2002-0840","year":"2002","key":"ref18"},{"journal-title":"Mitre Common Vulnerabilities Index Can-2001-0925","year":"2001","key":"ref19"},{"journal-title":"On Web Semantics and Data Mining Intrusion Detection as a Case Study Next Generation Data Mining","year":"2003","author":"undercoffer","key":"ref4"},{"journal-title":"DARPA Agent Markup Language","year":"2000","author":"hendler","key":"ref3"},{"key":"ref6","article-title":"Data Mining Approaches for Intrusion Detection","author":"lee","year":"1998","journal-title":"7th USENIX Security Symposium 1998"},{"key":"ref5","first-page":"151","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Intrusion Detection using Sequences of System Calls Journal of Computer Security"},{"key":"ref8","article-title":"On tests and Meassures of Groups Divergence","author":"mahalanobis","year":"1930","journal-title":"International Jounal of the Asiatic Society of Bengal"},{"journal-title":"Low-Complexity Fuzzy Relational Clustering Algorithms for Web Mining IEEE transactions on Fuzzy Systems","year":"2001","author":"krisnnapurarn","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"journal-title":"Computer Security Threat Monitoring and Surveillance","year":"1980","author":"anderson","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"journal-title":"Mitre Common Vulnerabilities Index Can-2002-0843","year":"2002","key":"ref20"},{"journal-title":"RFC 2616 Hypertext Transfer Protocol - HTTP\/1 1","year":"1999","author":"fielding","key":"ref22"},{"journal-title":"Cert advisory ca-2002-17 apache web server chunk handling vulnerability","year":"2002","key":"ref21"}],"event":{"name":"12th International Fuzzy Systems Conference","acronym":"FUZZY-03","location":"St Louis, MO, USA"},"container-title":["The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8573\/27148\/01206614.pdf?arnumber=1206614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:13:34Z","timestamp":1489425214000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206614\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/fuzz.2003.1206614","relation":{},"subject":[]}}