{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:38:50Z","timestamp":1775666330038,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/ijcnn.2009.5178592","type":"proceedings-article","created":{"date-parts":[[2009,8,5]],"date-time":"2009-08-05T18:59:01Z","timestamp":1249498741000},"page":"1827-1834","source":"Crossref","is-referenced-by-count":140,"title":["Neural Network based Intrusion Detection System for critical infrastructures"],"prefix":"10.1109","author":[{"given":"Ondrej","family":"Linda","sequence":"first","affiliation":[]},{"given":"Todd","family":"Vollmer","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Manic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"22","article-title":"intrusion detection with unlabeled data using clustering","author":"portnoy","year":"2001","journal-title":"Proc Of ACM CSS Workshop on Data Mining Applied Security"},{"key":"17","year":"0","journal-title":"Network mapper"},{"key":"23","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"18","year":"0","journal-title":"Nessus"},{"key":"15","article-title":"critical infrastructure: control systems and the terrorist threat","author":"shea","year":"0","journal-title":"Report for Congress"},{"key":"16","year":"0","journal-title":"Allan Bradley PLC 5 Controller"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1137\/0111030"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/72.329697"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738646"},{"key":"12","author":"werbos","year":"1994","journal-title":"The Roots of Backpropagation"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1117\/12.603567","article-title":"a clustering algorithm for intrusion detection","author":"wang","year":"2005","journal-title":"SPIE Conference on Data Mining Intrusion Detection Information Assurance and Data Networks Security"},{"key":"3","year":"0"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1992.226942"},{"key":"2","article-title":"design of networks for distributed digital control systems in nuclear power plants","author":"kim","year":"2000","journal-title":"Intl Topical Meeting on Nuclear Plant Instrumentation Controls and Human- Machine Interface Technologies (NPIC&HMIT 2000)"},{"key":"1","article-title":"anomaly-based intrusion detection for scada systems","author":"yang","year":"2006","journal-title":"5th Intl Topical Meeting on Nuclear Plant Instrumentation Control and Human Machine Interface Technologies (NPIC&HMIT 05)"},{"key":"10","first-page":"51","article-title":"learning program behavior profiles for intrusion detection","author":"gosh","year":"1999","journal-title":"proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1167253.1167288"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539307002568"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"9","article-title":"intrusion detection with neural networks","author":"ryan","year":"1998","journal-title":"Advances in Neural Information Precessing Systems 10"},{"key":"8","article-title":"learning patterns from unix process execution traced for intrusion detection","author":"lee","year":"1997","journal-title":"Proceedings of AAAI97 Workshop on AI methods in Fraud and Risk Management"}],"event":{"name":"2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta)","location":"Atlanta, Ga, USA","start":{"date-parts":[[2009,6,14]]},"end":{"date-parts":[[2009,6,19]]}},"container-title":["2009 International Joint Conference on Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5161636\/5178557\/05178592.pdf?arnumber=5178592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:35:12Z","timestamp":1497825312000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5178592\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2009.5178592","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}