{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:01Z","timestamp":1750307581825,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656163","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"1297-1301","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Neural network approach for intrusion detection"],"prefix":"10.1145","author":[{"given":"Amit Kumar","family":"Choudhary","sequence":"first","affiliation":[{"name":"National Institute of Technology, Kurukshetra, Kurukshetra, Haryana, India"}]},{"given":"Akhilesh","family":"Swarup","sequence":"additional","affiliation":[{"name":"Galgotias College of Engineering &amp; Tech., Gr. Noida, Kurukshetra, India"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"tech. report","author":"Anderson J. P.","year":"1980","unstructured":"J. P. Anderson , \"Computer Security Threat Monitoring and Surveillance\" , tech. report , James P. Anderson Co., Fort Washington , Pa ., 1980 . J. P. Anderson, \"Computer Security Threat Monitoring and Surveillance\", tech. report, James P. Anderson Co., Fort Washington, Pa., 1980."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_2_1_3_1","first-page":"109","volume-title":"Proceedings of 12th Annual Canadian Information Technology Security Symposium","author":"Bridges S. M.","year":"2000","unstructured":"S. M. Bridges and R. B. Vaughn , \" Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection \", Proceedings of 12th Annual Canadian Information Technology Security Symposium , pp. 109 -- 122 , 2000 . S. M. Bridges and R. B. Vaughn, \"Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection\", Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109--122, 2000."},{"key":"e_1_3_2_1_4_1","volume-title":"A Neural Network Based System for Intrusion Detection and Classification of Attacks\" IEEE International Conference on Advances in Intelligent Systems - Theory and Applications","author":"Moradi M.","year":"2004","unstructured":"M. Moradi , and M. Zulkernine , \" A Neural Network Based System for Intrusion Detection and Classification of Attacks\" IEEE International Conference on Advances in Intelligent Systems - Theory and Applications , Luxembourg-Kirchberg , Luxembourg, November 15--18, 2004 . M. Moradi, and M. Zulkernine, \"A Neural Network Based System for Intrusion Detection and Classification of Attacks\" IEEE International Conference on Advances in Intelligent Systems - Theory and Applications, Luxembourg-Kirchberg, Luxembourg, November 15--18, 2004."},{"key":"e_1_3_2_1_5_1","unstructured":"University of California at Irvine 1999. KDD Cup: &lt;http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.htm&gt;.  University of California at Irvine 1999. KDD Cup: &lt;http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.htm&gt;."},{"key":"e_1_3_2_1_7_1","first-page":"72","volume-title":"RI","author":"Ryan J.","year":"1997","unstructured":"J. Ryan , M. Lin , and R. Miikkulainen , \" Intrusion Detection with Neural Networks\" AI Approaches to Fraud Detection and Risk Management: Papers from the 1997 AAAI Workshop, Providence , RI , pp. 72 -- 79 , 1997 . J. Ryan, M. Lin, and R. Miikkulainen, \"Intrusion Detection with Neural Networks\" AI Approaches to Fraud Detection and Risk Management: Papers from the 1997 AAAI Workshop, Providence, RI, pp. 72--79, 1997."},{"key":"e_1_3_2_1_8_1","unstructured":"James Cannady \"Artificial neural networks for misuse detection\" Proceedings of the 1998 National Information Systems Security Conference (NISSC'98) Arlington VA 1998.  James Cannady \"Artificial neural networks for misuse detection\" Proceedings of the 1998 National Information Systems Security Conference (NISSC'98) Arlington VA 1998."},{"key":"e_1_3_2_1_9_1","volume-title":"Improving intrusion detection performance using keyword selection and neural networks\" Proceedings of the International Symposium on Recent Advances in Intrusion Detection","author":"Cunningham R.","year":"1999","unstructured":"R. Cunningham and R. Lippmann , \" Improving intrusion detection performance using keyword selection and neural networks\" Proceedings of the International Symposium on Recent Advances in Intrusion Detection , Purdue, IN , 1999 . R. Cunningham and R. Lippmann, \"Improving intrusion detection performance using keyword selection and neural networks\" Proceedings of the International Symposium on Recent Advances in Intrusion Detection, Purdue, IN, 1999."},{"key":"e_1_3_2_1_10_1","unstructured":"Srinivas Mukkamala \"Intrusion detection using neural networks and support vector machine\" Proceedings of the 2002 IEEE International Honolulu HI 2002.  Srinivas Mukkamala \"Intrusion detection using neural networks and support vector machine\" Proceedings of the 2002 IEEE International Honolulu HI 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.97934"},{"key":"e_1_3_2_1_12_1","volume-title":"Canada","author":"Timothy M.","year":"1995","unstructured":"M. Timothy , \"Advanced Algorithms for Neural Networks : AC++ Sourcebook,\" Wiley , Canada , 1995 . M. Timothy, \"Advanced Algorithms for Neural Networks: AC++ Sourcebook,\" Wiley, Canada, 1995."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656163","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:17Z","timestamp":1750250477000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":12,"alternative-id":["10.1145\/1655925.1656163","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656163","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}