{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:42:22Z","timestamp":1725424942395},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/noms.2008.4575234","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T19:17:28Z","timestamp":1221592648000},"page":"867-870","source":"Crossref","is-referenced-by-count":5,"title":["Intrusion detection through artificial neural networks"],"prefix":"10.1109","author":[{"given":"Igor Vinicius Mussoi","family":"de Lima","sequence":"first","affiliation":[]},{"given":"Joelson Alencar","family":"Degaspari","sequence":"additional","affiliation":[]},{"given":"Joao Bosco Mangueira","family":"Sobral","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Intrusion detection message exchange requirements","year":"2003","author":"wood","key":"15"},{"key":"13","article-title":"the bsd packet filter: a new architecture for user-level packet capture","author":"mccanne","year":"1993","journal-title":"USENIX Technical Conference"},{"journal-title":"Intrusion detection with neural networks","year":"2002","author":"ryan","key":"14"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"3","article-title":"artificial neural networks to misuse detection","author":"cannady","year":"1998","journal-title":"First International Workshop on the Recent Advances in Intrusion Detection"},{"year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PDSE.2000.847862"},{"journal-title":"Neural Networks A Comprehensive Foundation","year":"2001","author":"haykin","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932184"},{"key":"6","article-title":"common intrusion detection framework","author":"chen","year":"1998","journal-title":"Computer Emergency Response Team"},{"journal-title":"Snort 2 - Intrusion Detection System in portuguese Open Source","year":"2003","author":"caswell","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932190"},{"journal-title":"NESSUS Project Project founder and current leader","year":"0","author":"deraison","key":"8"}],"event":{"name":"NOMS 2008 - 2008 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2008,4,7]]},"location":"Salvador, Bahia, Brazil","end":{"date-parts":[[2008,4,11]]}},"container-title":["NOMS 2008 - 2008 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4567164\/4575087\/04575234.pdf?arnumber=4575234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:02:03Z","timestamp":1489690923000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4575234\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/noms.2008.4575234","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}