{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:26:24Z","timestamp":1729653984852,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fuzzy.2005.1452414","type":"proceedings-article","created":{"date-parts":[[2005,7,28]],"date-time":"2005-07-28T01:00:20Z","timestamp":1122512420000},"page":"325-330","source":"Crossref","is-referenced-by-count":7,"title":["A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"A.","family":"El--Semary","sequence":"first","affiliation":[]},{"given":"J.","family":"Edmonds","sequence":"additional","affiliation":[]},{"given":"J.","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"M.","family":"Papa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"66","article-title":"Mining Audit Data to Build Intrustion Detection Models","author":"lee","year":"1998","journal-title":"Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X"},{"journal-title":"Lincoln Laboratory Data Sets Massachusetts Institute of Technology","year":"0","key":"ref12"},{"key":"ref13","article-title":"Discovering frequent episodes in sequences","author":"mannila","year":"1995","journal-title":"First International Conference on KDD"},{"key":"ref14","first-page":"146","article-title":"Discovering generalized episodes using minimal occurrences","author":"mannila","year":"1996","journal-title":"AAAI press"},{"key":"ref15","first-page":"533","article-title":"Fuzzy Reasoning in Jess: The FuzzyJ Toolkit and FuzzyJess","author":"orchard","year":"2001","journal-title":"Proceedings of the ICEIS 2001 3rd International Conference on Enterprise Information Systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NSPW.1994.656230"},{"key":"ref17","first-page":"1","article-title":"Mining quantitative association rules in large relational tables","author":"srikant","year":"0","journal-title":"Proceedings of the 1996 ACM SIGMOD international conference on Management of data"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/604264.604267","article-title":"Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project","volume":"30","author":"lee","year":"2001","journal-title":"SIGMOD Record"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref4","article-title":"Data Mining for Network Intrusion Detection","author":"dokas","year":"2002","journal-title":"Proceedings of NSF Workshop on Next Generation Data Mining"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2000.877441"},{"key":"ref6","article-title":"Evolving Fuzzy Classifiers for Intrusion Detection","author":"gomez","year":"2002","journal-title":"Proc of the 3rd Annual IEEE Information Assurance Workshop"},{"key":"ref5","article-title":"Jess, The Java Expert System Shell","author":"friedman-hill","year":"0","journal-title":"Sandia National Laboratories"},{"key":"ref8","first-page":"175","article-title":"Security is fuzzy! applying the fuzzy logic paradigm to the multipolicy paradigm","author":"hosmer","year":"1993","journal-title":"Proceedings of the 1992&#x2013;93 workshop on New Secuity Paradigms Little Compton"},{"key":"ref7","article-title":"1999 DARPA Intrusion Detection System Evaluation: Design and Procedures","author":"haines","year":"0","journal-title":"MIT Lincoln Laboratory Technical Report"},{"key":"ref2","article-title":"Fuzzy Data: Mining and Genetic Algorithms Applied to Intrusion Detection","author":"bridges","year":"2000","journal-title":"Proceedings of the 23rd National Information Systems Security Conference"},{"key":"ref1","first-page":"487","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"Proceedings of the 20th International Conference on Very Large Databases"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/273244.273257"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1973.5408575"},{"key":"ref22","first-page":"26","article-title":"Making computers think like people","author":"zadeh","year":"0","journal-title":"IEEE Spectrum 8\/1984"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(75)90036-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/2.53"}],"event":{"name":"The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05.","location":"Reno, Nevada, USA"},"container-title":["The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9859\/31200\/01452414.pdf?arnumber=1452414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T21:36:42Z","timestamp":1497649002000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1452414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2005.1452414","relation":{},"subject":[]}}