{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:04:43Z","timestamp":1729609483036,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/icnc.2010.5583161","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T14:03:07Z","timestamp":1285768987000},"page":"335-339","source":"Crossref","is-referenced-by-count":2,"title":["IABA: An improved PNN Algorithm for anomaly detection in network security management"],"prefix":"10.1109","author":[{"given":"Wu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hai-xin","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Jian-ping","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00026-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(90)90049-Q"},{"key":"ref12","first-page":"177","author":"bishop","year":"2005","journal-title":"Neural Networks for Pattern Recognition"},{"key":"ref13","first-page":"148","article-title":"Experiments with a New Boosting Algorithm","author":"freund","year":"2006","journal-title":"Proceedings of 7th International Conference on Machine Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref4","first-page":"50","article-title":"Learning patterns from Unix process execution traces for intrusion detection","author":"lee","year":"2003","journal-title":"Proc AAAI Workshop AI Approaches to Fraud Detection and Risk Management"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Computer Security"},{"key":"ref6","first-page":"268","article-title":"Intrusion detection: Applying machine learning to Solaris audit data","author":"endler","year":"2002","journal-title":"Proc Annual Computer Security Applications Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932193"},{"key":"ref8","first-page":"135","article-title":"Using Adaptive Boost with Different Network Topologies for System Call Analysis, in smart Engineering System Design: Neural Networks, Fuzzy Logic, Evolutionary Programming, Complex Systems and Artificial Life","volume":"12","author":"florez","year":"2002","journal-title":"Proc of the Artificial Neural Networks in Engineering Conference"},{"key":"ref7","first-page":"443","article-title":"Artificial Neural networks for misuse Detection","author":"cannady","year":"2001","journal-title":"Proc National Information Systems Security Conference"},{"key":"ref2","article-title":"Study on Intrusion Detection Technology with Traceback and Isolation of Attacking Sources","author":"wu","year":"2004","journal-title":"PhD thesis"},{"key":"ref1","first-page":"19","article-title":"Probabilistic neural networks based network security management","volume":"5","author":"wu","year":"2008","journal-title":"J of Communication and Computer (ISSN1548&#x2013;7709)"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/ICPR.2002.1047476","article-title":"Parzen-window network intrusion detectors","volume":"4","author":"yeung","year":"2002","journal-title":"Proc 16th International Conference on Pattern Recognition"}],"event":{"name":"2010 Sixth International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2010,8,10]]},"location":"Yantai, China","end":{"date-parts":[[2010,8,12]]}},"container-title":["2010 Sixth International Conference on Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5564900\/5582888\/05583161.pdf?arnumber=5583161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:23:54Z","timestamp":1559694234000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5583161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icnc.2010.5583161","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}