{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:21:59Z","timestamp":1730222519787,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/fuzzy.2010.5584893","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T18:06:18Z","timestamp":1285783578000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Exploiting Timed Automata-based Fuzzy Controllers and data mining to detect computer network intrusions"],"prefix":"10.1109","author":[{"given":"Giovanni","family":"Acampora","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Intrusion Detection with Neural Networks","volume":"10","author":"ryan","year":"1998","journal-title":"Advances in neural information processing systems"},{"key":"ref3","article-title":"Decision tree classifiers for computer intrusion detection","author":"li","year":"2003","journal-title":"Real-time system security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"},{"key":"ref5","first-page":"149","article-title":"Evaluating Clustering Techniques for Network Intrusion Detection","author":"zhong","year":"2004","journal-title":"Proceeding of 10th ISSATInt Conf on Reliability and Quality Design"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(95)00305-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.603567"},{"key":"ref2","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2001.943772"},{"key":"ref1","first-page":"800","author":"scarfone","year":"2007","journal-title":"Guide to intrusion detection and prevention systems (IDPS)"}],"event":{"name":"2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2010,7,18]]},"location":"Barcelona, Spain","end":{"date-parts":[[2010,7,23]]}},"container-title":["International Conference on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5573642\/5583929\/05584893.pdf?arnumber=5584893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T03:08:06Z","timestamp":1490065686000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5584893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2010.5584893","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}