{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:42:39Z","timestamp":1753357359239,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393225","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"47-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Hybrid network intrusion detection system using expert rule based approach"],"prefix":"10.1145","author":[{"given":"A. S.","family":"Aneetha","sequence":"first","affiliation":[{"name":"Anna University, Chennai, India"}]},{"given":"T. S.","family":"Indhu","sequence":"additional","affiliation":[{"name":"Anna University, Chennai, India"}]},{"given":"S.","family":"Bose","sequence":"additional","affiliation":[{"name":"Anna University, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645890.671406"},{"key":"e_1_3_2_1_2_1","first-page":"3551","volume-title":"Proceedings in IEEE Global Telecommunication Conference, GLOBECOM'04","volume":"6","author":"Sun Bo","year":"2004"},{"key":"e_1_3_2_1_3_1","first-page":"503","volume-title":"IEEE International conference on intelligent computer communication and processing-ICCP","author":"Amza Cristina","year":"2011"},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"11","article-title":"Unsupervised Single Link Hierarchical Clustering","author":"Lupsa Dana Avram","year":"2005","journal-title":"STUDIA UNIV. BABES-BOLYAI, Informatica"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2009.64"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1046290.1046321"},{"volume-title":"Technical Report SRI-CSL-95-07","year":"1995","author":"Anderson Debra","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"1083","volume-title":"Proceesings of Canadian conference on Electrical and Computer Engineering","author":"Y","year":"2003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.142"},{"key":"e_1_3_2_1_10_1","unstructured":"Mahesh Kumar Sabhnani Gursel Serpen \"Formulation of Heuristic Rules for Misuse and Anomaly Detection for U2R attacks in Solaris Operating System Environment\" Toledo Ohio 43606 USA 2001.  Mahesh Kumar Sabhnani Gursel Serpen \"Formulation of Heuristic Rules for Misuse and Anomaly Detection for U2R attacks in Solaris Operating System Environment\" Toledo Ohio 43606 USA 2001."},{"key":"e_1_3_2_1_11_1","first-page":"5","volume-title":"Proceeding of ACM CSS workshop on data mining applied to security (DMSA -- 2001","author":"Portnoy Leonid","year":"2001"},{"key":"e_1_3_2_1_12_1","first-page":"553","volume-title":"Proceedings of IEEE 7th malayasia International Conference on communication and IEEE International Conference in Network","author":"Shokri Reza","year":"2005"},{"key":"e_1_3_2_1_13_1","first-page":"79","volume-title":"Proceedings of the USENIX Security Symposium","author":"Lee Wenke","year":"2008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.648.655"},{"key":"e_1_3_2_1_15_1","first-page":"2","volume-title":"Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05)","author":"Pan Zhi Song","year":"2005"},{"first-page":"2463","volume-title":"Proceedings of the Second International Conference on Machine Learning and Cybernetics","year":"2003","key":"e_1_3_2_1_16_1"}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:46Z","timestamp":1750240486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":16,"alternative-id":["10.1145\/2393216.2393225","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393225","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}