{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:15:29Z","timestamp":1729638929165,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966020","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:41:30Z","timestamp":1499722890000},"page":"1427-1434","source":"Crossref","is-referenced-by-count":9,"title":["Multiscale Hebbian neural network for cyber threat detection"],"prefix":"10.1109","author":[{"given":"Sana","family":"Siddiqui","sequence":"first","affiliation":[]},{"given":"Muhammad Salman","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Ken","family":"Ferens","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2014","author":"hagan","journal-title":"Neural Network Design","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.4018\/IJSSCI.2015070102"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/2465529.2466587"},{"key":"ref30","article-title":"Indicators of Attack vs. Indicators of Compromise","author":"decianno","year":"2014","journal-title":"Crowds"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-20550-2_6","article-title":"Robust and effective malware detection through quantitative data flow graph metrics","author":"wuchner","year":"2015","journal-title":"Proceedings of the 2nd International Conference on Intrusion and Malware Detection and Vulnerability Assessment"},{"key":"ref10","article-title":"The Organization of Behavior","author":"hebb","year":"1949","journal-title":"A Neuropsychological Theory"},{"year":"1998","author":"haykin","journal-title":"Neural Networks A Comprehensive Foudation","key":"ref11"},{"year":"2006","author":"merenyi","journal-title":"Chapter 3 - Hebbian Learning (ECE502 course)","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/BF00275687"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/IMSCCS.2006.175"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/NPC.2008.19"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-540-74742-0_30"},{"year":"2008","author":"ming leung","journal-title":"Simple neural networks for pattern classification","key":"ref17"},{"key":"ref18","first-page":"801","article-title":"Multiscale analysis of the human brain cortex","volume":"62","author":"mutihac","year":"2010","journal-title":"Romanian Reports in Physics"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.jneumeth.2010.08.021"},{"year":"2014","journal-title":"Imperva","article-title":"Web Attacks: The Biggest Threat to Your Network","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.4018\/jcini.2010010101"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1080\/19393555.2015.1125974"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1177\/1071181312561063"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1162\/neco.1996.8.5.895"},{"key":"ref29","article-title":"A closer look at the Angler exploit kit","author":"howard","year":"2015","journal-title":"Sophos Ltd"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1073\/pnas.88.10.4433"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1162\/089976698300017142"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1126\/science.1372754"},{"year":"2016","journal-title":"Intel Security","article-title":"2016 Threat Predictions","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1162\/neco.1994.6.3.357"},{"year":"2015","author":"taylor","journal-title":"Biggest cybersecurity threats in 2016","key":"ref1"},{"key":"ref20","first-page":"107","article-title":"Multi-resolutional shape features via non-Euclidean wavelets: Applications to statistical analysis of cortical thickness","volume":"93","author":"hwa kim","year":"2014","journal-title":"Neuro Image"},{"year":"2010","author":"chun-lin","journal-title":"A Tutorial of the Wavelet Transform","key":"ref22"},{"year":"2009","author":"mallat","journal-title":"A Wavelet Tour of Signal Processing The Sparse Way","key":"ref21"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1201\/9780203011591"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/34.192463"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref25","article-title":"ADFA-NBI5-Datasets - UNSW-NB15 network packets and flow captures","author":"moustafa","year":"2014","journal-title":"Cyber Range Lab of the Australian Centre for Cyber Security"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2017,5,14]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966020.pdf?arnumber=7966020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,29]],"date-time":"2019-09-29T10:27:10Z","timestamp":1569752830000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966020","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}