{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:20Z","timestamp":1750307300384,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T00:00:00Z","timestamp":1284595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,16]]},"DOI":"10.1145\/1858378.1858420","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Wireless intrusion detection based on different clustering approaches"],"prefix":"10.1145","author":[{"given":"Athira. M.","family":"Nambiar","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Coimbatore, India"}]},{"given":"Asha","family":"Vijayan","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Coimbatore, India"}]},{"given":"Aishwarya","family":"Nandakumar","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Coimbatore, India"}]}],"member":"320","published-online":{"date-parts":[[2010,9,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1066127"},{"key":"e_1_3_2_1_2_1","volume-title":"IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10","author":"Guennoun Mouhcine","year":"2008","unstructured":"}} Mouhcine Guennoun , Aboubakr Lbekkouri and Khalil El-Khatib,\" Optimizing the Feature Set of Wireless Intrusion Detection Systems , IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10 , October 2008 }}Mouhcine Guennoun, Aboubakr Lbekkouri and Khalil El-Khatib,\" Optimizing the Feature Set of Wireless Intrusion Detection Systems, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1105924.1106057"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024600519144"},{"key":"e_1_3_2_1_5_1","volume":"4","author":"Palomo Esteban J.","year":"2009","unstructured":"}} Esteban J. Palomo , Enrique Dom\u00ednguez , Rafael M. Luque and Jos\u00e9 Mu\u00f1oz , \"An Intrusion Detection System based on Hierarchical Self-Organization \" , Journal of Information Assurance and Security 4 ( 2009 ), June 2009 }}Esteban J. Palomo, Enrique Dom\u00ednguez, Rafael M. Luque and Jos\u00e9 Mu\u00f1oz, \"An Intrusion Detection System based on Hierarchical Self-Organization\", Journal of Information Assurance and Security 4 (2009), June 2009","journal-title":"Journal of Information Assurance and Security"},{"key":"e_1_3_2_1_6_1","volume-title":"National Information Systems Security Conference (NISSC)","author":"Bridges Susan M.","year":"2000","unstructured":"}} Susan M. Bridges , Rayford B. Vaughn , \" Fuzzy Data Mining and Genetic Algorithms Appiled to Intrusion , National Information Systems Security Conference (NISSC) , October 2000 }}Susan M. Bridges, Rayford B. Vaughn, \"Fuzzy Data Mining and Genetic Algorithms Appiled to Intrusion, National Information Systems Security Conference (NISSC), October 2000"},{"key":"e_1_3_2_1_7_1","unstructured":"}}Y. Dhanalakshmi I. and Dr. I. Ramesh Babu \"Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms\" IJCSNS International Journal of Computer Science and Network Security February 2008  }}Y. Dhanalakshmi I. and Dr. I. Ramesh Babu \"Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms\" IJCSNS International Journal of Computer Science and Network Security February 2008"},{"key":"e_1_3_2_1_8_1","volume-title":"PHI Learning Private Limited","author":"Soman K. P","year":"2009","unstructured":"}} K. P Soman , Insight into Data Mining , PHI Learning Private Limited , July 2009 }}K. P Soman, Insight into Data Mining, PHI Learning Private Limited, July 2009"},{"key":"e_1_3_2_1_9_1","volume-title":"Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing","author":"Tsakountakis Alexandros","year":"2007","unstructured":"}} Alexandros Tsakountakis , Georgios Kambourakis and Stefanos Gritzalis , \" Towards effective Wireless Intrusion Detection in IEEE 802.11i\" , Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing , 2007 }}Alexandros Tsakountakis, Georgios Kambourakis and Stefanos Gritzalis, \"Towards effective Wireless Intrusion Detection in IEEE 802.11i\", Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing, 2007"},{"key":"e_1_3_2_1_10_1","volume-title":"CCECE 2004- CCGEI 2004","author":"Yangla Hongyu","year":"2004","unstructured":"}} Hongyu Yangla , Lixia Xie , Jizhou Sun' , \" Intrusion Detection for Wireless Local Area Network\" , CCECE 2004- CCGEI 2004 , May 2004 }}Hongyu Yangla, Lixia Xie, Jizhou Sun', \"Intrusion Detection for Wireless Local Area Network\", CCECE 2004- CCGEI 2004, May 2004"},{"key":"e_1_3_2_1_11_1","unstructured":"}}Slobodan Petrovic \"Vulnerabilities in wireless networks and intrusion detection\" Telektronikk 1.2005  }}Slobodan Petrovic \"Vulnerabilities in wireless networks and intrusion detection\" Telektronikk 1.2005"}],"event":{"name":"A2CWiC '10: Emerging Trends in Computing","acronym":"A2CWiC '10","location":"Coimbatore India"},"container-title":["Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858378.1858420","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1858378.1858420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:53Z","timestamp":1750244393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858378.1858420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,16]]},"references-count":11,"alternative-id":["10.1145\/1858378.1858420","10.1145\/1858378"],"URL":"https:\/\/doi.org\/10.1145\/1858378.1858420","relation":{},"subject":[],"published":{"date-parts":[[2010,9,16]]},"assertion":[{"value":"2010-09-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}