{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T21:14:25Z","timestamp":1776374065262,"version":"3.51.2"},"reference-count":18,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icpr.2002.1047476","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T23:45:08Z","timestamp":1056584708000},"page":"385-388","source":"Crossref","is-referenced-by-count":73,"title":["Parzen-window network intrusion detectors"],"prefix":"10.1109","volume":"4","author":[{"family":"Dit-Yan Yeung","sequence":"first","affiliation":[]},{"given":"C.","family":"Chow","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816048"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347160"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19990428"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1994.6.2.270"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/72.661127"},{"key":"3","first-page":"405","article-title":"Applying CMAC-based on-line learning to intrusion detection","volume":"5","author":"cannady","year":"2000","journal-title":"Proceedings of the International Joint Conference on Neural Networks"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1998.682263"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19941330"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00140-7"},{"key":"7","first-page":"518","article-title":"A novelty detection approach to classification","volume":"1","author":"japkowicz","year":"1995","journal-title":"Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence"},{"key":"6","first-page":"141","article-title":"A study in using neural networks for anomaly and misuse detection","author":"ghosh","year":"1999","journal-title":"Proceedings of the Eighth USENIX Security Symposium"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1126\/science.1891718"},{"key":"9","first-page":"130","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"8","first-page":"66","article-title":"Mining audit data to build intrusion detection models","author":"lee","year":"1998","journal-title":"Proceedings of the fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"}],"event":{"name":"16th International Conference on Pattern Recognition","location":"Quebec City, Que., Canada","acronym":"ICPR-02"},"container-title":["Object recognition supported by user interaction for service robots"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8091\/22449\/01047476.pdf?arnumber=1047476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:59:13Z","timestamp":1489442353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1047476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icpr.2002.1047476","relation":{},"subject":[]}}