{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:59:00Z","timestamp":1729616340006,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/icnc.2010.5583250","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T18:03:07Z","timestamp":1285783387000},"page":"832-836","source":"Crossref","is-referenced-by-count":1,"title":["A novel model of IDS based on automatic clustering number determination"],"prefix":"10.1109","author":[{"given":"Jing","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Jiang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hongjuan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"5","article-title":"Intrusion Detection with unlabeled data usding clustering","author":"portnoy","year":"2001","journal-title":"the ACM CSS workshop on Data Mining Applied to Security"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"5854","DOI":"10.1109\/WCICA.2006.1714200","article-title":"K-Means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection","author":"xiao","year":"2006","journal-title":"The 6th World Congress on Intelligent Control and Automation"},{"key":"ref10","article-title":"Support vector clustering","volume":"2","author":"ben-hur","year":"2001","journal-title":"Journal of Machine Learning Research"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/72.238318"},{"key":"ref5","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"1999","journal-title":"IEEE Symp on Security and Privacy"},{"key":"ref8","first-page":"145","article-title":"Data Mining for Network Intrusion Detection","author":"paul","year":"2002","journal-title":"Proc NSF Workshop Next Generation Data Mining"},{"key":"ref7","first-page":"105","article-title":"Model Selection for Support Vector Machines","author":"chapelle","year":"2000","journal-title":"A dvances in Neural Inf ormation Processing Systemss"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref9","first-page":"189","article-title":"Fuzzy Intrusion Detection","author":"john","year":"2001","journal-title":"IFSA World Congress and 20th North American Fuzzy Information Processing Society (NAFIPS) International Conference"},{"key":"ref1","first-page":"422","article-title":"Validation of fuzz partitions obtained through fuzzy C-means clustering","author":"dw","year":"2003","journal-title":"the 14th Int'l Symp On Foundations of Intelligent Systems"}],"event":{"name":"2010 Sixth International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2010,8,10]]},"location":"Yantai, China","end":{"date-parts":[[2010,8,12]]}},"container-title":["2010 Sixth International Conference on Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5564900\/5582885\/05583250.pdf?arnumber=5583250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T14:36:36Z","timestamp":1497882996000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5583250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icnc.2010.5583250","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}