{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T01:35:49Z","timestamp":1748396149458,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/icct.2013.6820342","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:58:25Z","timestamp":1401461905000},"page":"11-14","source":"Crossref","is-referenced-by-count":1,"title":["Network signal processing and intrusion detection by a hybrid model of LSSVM and PSO"],"prefix":"10.1109","author":[{"family":"Fan Li","sequence":"first","affiliation":[]},{"family":"Dongxu Li","sequence":"additional","affiliation":[]},{"family":"Chunhui Wang","sequence":"additional","affiliation":[]},{"family":"Zheng Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"13","DOI":"10.1006\/jmbi.2001.4580"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1016\/j.neucom.2012.11.030"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/j.jhydrol.2005.05.007"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/j.amc.2007.04.109"},{"key":"3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.neucom.2011.02.021","article-title":"Improved competitive learning neural networks for network intrusion and fraud detection","volume":"75","author":"zhong lei","year":"2012","journal-title":"Neurocomputing"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1016\/j.patrec.2004.09.045"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1016\/j.cose.2006.05.003"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/j.solener.2012.09.001"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.jbiomech.2013.02.026"},{"key":"6","doi-asserted-by":"crossref","first-page":"2042","DOI":"10.1016\/j.asoc.2010.07.002","article-title":"Neural visualization of network traffic data for intrusion detection","volume":"11","author":"corchado","year":"2011","journal-title":"Applied Soft Computing"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1016\/j.cose.2008.06.001"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1016\/j.watres.2007.09.032"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.fuel.2012.10.016"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1016\/j.compag.2008.05.021"}],"event":{"name":"2013 15th IEEE International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2013,11,17]]},"location":"Guilin, China","end":{"date-parts":[[2013,11,19]]}},"container-title":["2013 15th IEEE International Conference on Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6813703\/6820339\/06820342.pdf?arnumber=6820342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:07:38Z","timestamp":1498126058000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6820342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icct.2013.6820342","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}