{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T08:46:28Z","timestamp":1749804388944,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ijcnn.2003.1223922","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T14:34:28Z","timestamp":1079966068000},"page":"1512-1516","source":"Crossref","is-referenced-by-count":13,"title":["RBF-based real-time hierarchical intrusion detection systems"],"prefix":"10.1109","volume":"2","author":[{"family":"Ju Jiang","sequence":"first","affiliation":[]},{"family":"Chunlin Zhang","sequence":"additional","affiliation":[]},{"given":"M.","family":"Kamel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Training a neural-neural based intrusion detector to recognize novel attacks","author":"lee","year":"2000","journal-title":"Presented at IEEE Workshop Information Assurance and Security"},{"key":"ref3","first-page":"125","article-title":"A neural network approach towards intrusion detection","volume":"1","author":"fox","year":"1990"},{"article-title":"An overview of radial basis function network","year":"0","author":"ghosh","key":"ref10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1992.226942"},{"journal-title":"Machine Learning for Intrusion Detection Project The University of Columbia Fall 2000","article-title":"KDD Cup 1999 Data","year":"0","key":"ref11"},{"key":"ref5","article-title":"Next generation intrusion detection: Autonomous reinforcement learning of network attacks","author":"cannady","year":"2000","journal-title":"Georgia Tech Information Security Center"},{"key":"ref12","article-title":"Next generation intrusion defection: autonomous reinforcement learning of network attacks","author":"cannady","year":"2000","journal-title":"Proc of the 23rd National Information Systems Security Conf (NISSC 2000)"},{"article-title":"Hierarchical and modular neural netwoks","year":"0","author":"bakshi","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738647"},{"article-title":"A Survey of the applications of neural networks to intrusion detection","year":"2001","author":"novokhodko","key":"ref2"},{"key":"ref9","article-title":"HIDE, a hierarchical network intrusion detection system using statistical pre-processing and neural network Classification","author":"zhang","year":"2001","journal-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738646"}],"event":{"name":"2003 International Joint Conference on Neural Networks","acronym":"IJCNN-03","location":"Portland, OR, USA"},"container-title":["Proceedings of the International Joint Conference on Neural Networks, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8672\/27486\/01223922.pdf?arnumber=1223922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T19:40:55Z","timestamp":1489434055000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1223922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2003.1223922","relation":{},"subject":[]}}