{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:50:03Z","timestamp":1729626603080,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/iceei.2011.6021705","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T20:25:16Z","timestamp":1318451116000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Network anomaly detection tools based on association rules"],"prefix":"10.1109","author":[{"given":"Zulaiha Ali","family":"Othman","sequence":"first","affiliation":[]},{"given":"Entisar E.","family":"Eljadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/FUZZ.2003.1206547"},{"year":"1998","author":"kuok","journal-title":"Mining Fuzzy Assocaition Rules in Databases","key":"17"},{"key":"18","article-title":"Fuzzy data mining and genetic algorithms applied to intrusion detection","author":"bridges","year":"2000","journal-title":"Proceedings of the National Information Systems Security Conference"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ETCS.2009.451"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1145\/233269.233311","article-title":"Mining quantitative association rules in large relational tables","author":"srikant","year":"1996","journal-title":"SIGMOD'96 Montreal Canada"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/NAFIPS.2002.1018103"},{"key":"14","article-title":"Intrusion detection using data mining along fuzzy logic and genetic algorithms","volume":"8","author":"dhanalakshmi","year":"2008","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"11","article-title":"FARM: A data mining system for discovering fuzzy association rules","author":"au","year":"1999","journal-title":"IEEE International Fuzzy System Conference Proceedings"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/j.asoc.2008.06.001"},{"key":"21","article-title":"Genetic algorithm optimization of membership functions for mining fuzzy association rules","author":"wang","year":"2000","journal-title":"International Joint Conference on Information System Fuzzy Theory and Technology"},{"key":"20","article-title":"Modeling an intrusion detection system using data mining and genetic algorithms based on fuzzy logic","volume":"8","author":"prasad","year":"2008","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"year":"2011","journal-title":"Wireshire + Cace Pilot","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1117\/12.666611"},{"year":"2007","author":"orebaugh","journal-title":"Wireshark & Ethereal Network Protocol Analyzer Toolkit","key":"24"},{"key":"25","article-title":"A comparison of leading data mining tools","author":"john","year":"1998","journal-title":"Fourth International Conferences on Knowledge Discovery and Data Mining"},{"year":"2002","author":"phoha","journal-title":"The Springer Internet Security Dictionary","key":"3"},{"key":"2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/ICITA.2005.57","article-title":"Agent-based network intrusion system using data mining approaches","volume":"1","author":"lui","year":"2005","journal-title":"Proc 3rd Int Conf Information Technology and Applications"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/FCST.2009.22"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/1090191.1080118"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.21236\/ADA375846","author":"allen","year":"2000","journal-title":"State of the Practice of Intrusion Detection Technologies"},{"year":"2000","author":"jones","journal-title":"Computer System Intrusion Detection A Survey","key":"6"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/IAW.2006.1652083"},{"year":"2007","author":"varun","journal-title":"Anomaly Detection A Survey Department of Computer Science and Engineering","key":"4"},{"key":"9","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"Proceeding of the 20th VLDB Conference"},{"year":"2006","author":"han","journal-title":"Data Mining Concepts and Techniques","key":"8"}],"event":{"name":"2011 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2011,7,17]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2011,7,19]]}},"container-title":["Proceedings of the 2011 International Conference on Electrical Engineering and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6011492\/6021499\/06021705.pdf?arnumber=6021705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T11:17:15Z","timestamp":1560770235000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6021705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iceei.2011.6021705","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}