{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:01:26Z","timestamp":1766484086468,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3109053","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"1171-1177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Semantic-based lightweight ontology learning framework"],"prefix":"10.1145","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[{"name":"UNSW at Canberra, Australia"}]},{"given":"Morteza","family":"Saberi","sequence":"additional","affiliation":[{"name":"UNSW at Canberra, Australia"}]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[{"name":"UNSW at Canberra, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1002\/sec.1224"},{"key":"e_1_3_2_1_2_1","first-page":"522","article-title":"2016. A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack","volume":"514","author":"Chaudhary V.N.","year":"2016","unstructured":"A. Chaudhary , V.N. Tiwari and A. Kumar . 2016. A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in MANETs. In I. J. Network Security . 2016 , 514 -- 522 . A. Chaudhary, V.N. Tiwari and A. Kumar. 2016. A new intrusion detection system based on soft computing techniques using neuro-fuzzy classifier for packet dropping attack in MANETs. In I. J. Network Security. 2016, 514--522.","journal-title":"MANETs. In I. J. Network Security"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.ins.2013.08.007"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1006\/knac.1993.1008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/304851.304863"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-540-39718-2_22"},{"unstructured":"DAML+OIL. http:\/\/www.daml.org\/  DAML+OIL. http:\/\/www.daml.org\/","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-3-540-30176-9_41"},{"key":"e_1_3_2_1_9_1","volume-title":"18th International Joint Conference on Artificial Intelligence.","author":"Undercoffer J.","year":"2004","unstructured":"J. Undercoffer , J. Pinkston , A. Joshi and T. Finin . 2004. A Target-Centric Ontology for Intrusion Detection . In 18th International Joint Conference on Artificial Intelligence. 2004 , 9--15. J. Undercoffer, J. Pinkston, A. Joshi and T. Finin. 2004. A Target-Centric Ontology for Intrusion Detection. In 18th International Joint Conference on Artificial Intelligence. 2004, 9--15."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-540-45248-5_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.5555\/645360.650759"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Workshop on Ontology Learning, 14th European Conference on Artificial Intelligence.","author":"Bisson G.","year":"2000","unstructured":"Bisson , G. , N\u00e9dellec , C. and Ca\u00f1amero , D . 2000. Designing clustering methods for ontology building---The Mo'K workbench . In Proceedings of the Workshop on Ontology Learning, 14th European Conference on Artificial Intelligence. Amsterdam : IOS Press. 2000 , 13--19. Bisson, G., N\u00e9dellec, C. and Ca\u00f1amero, D. 2000. Designing clustering methods for ontology building---The Mo'K workbench. In Proceedings of the Workshop on Ontology Learning, 14th European Conference on Artificial Intelligence. Amsterdam: IOS Press. 2000, 13--19."},{"key":"e_1_3_2_1_13_1","first-page":"12","article-title":"1998. A corpus-based conceptual clustering method for verb frames and ontology acquisition. In International Conference on Language Resources and Evaluation Workshop on Adapting Lexical and Corpus Resources to Sublanguages and Applications. Paris","volume":"5","author":"Faure D.","year":"1998","unstructured":"Faure , D. and N\u00e9dellec , C . 1998. A corpus-based conceptual clustering method for verb frames and ontology acquisition. In International Conference on Language Resources and Evaluation Workshop on Adapting Lexical and Corpus Resources to Sublanguages and Applications. Paris : European Language Resources Association . 1998 , 5 -- 12 . Faure, D. and N\u00e9dellec, C. 1998. A corpus-based conceptual clustering method for verb frames and ontology acquisition. In International Conference on Language Resources and Evaluation Workshop on Adapting Lexical and Corpus Resources to Sublanguages and Applications. Paris: European Language Resources Association. 1998, 5--12.","journal-title":"European Language Resources Association"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/646996.711420"},{"key":"e_1_3_2_1_15_1","volume-title":"12th International Conference","author":"Maedche A.","year":"2000","unstructured":"Maedche , A. and Staab , S . 2000. Mining ontologies from text. In Knowledge Acquisition, Modeling and Management , 12th International Conference . Berlin, Germany : Springer. 2000 , 189--202. Maedche, A. and Staab, S. 2000. Mining ontologies from text. In Knowledge Acquisition, Modeling and Management, 12th International Conference. Berlin, Germany: Springer. 2000, 189--202."},{"unstructured":"Salton G. and McGill M.J. 1986. Introduction to modern information retrieval. NewYork: McGraw-Hill.   Salton G. and McGill M.J. 1986. Introduction to modern information retrieval. NewYork: McGraw-Hill.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/11428817_21"},{"key":"e_1_3_2_1_18_1","first-page":"636","article-title":"-H. 2003. Mining semantic networks for knowledge discovery. In Proceedings of the Third IEEE International Conference on Data Mining. Washington","volume":"633","author":"Rajaraman K.","year":"2003","unstructured":"Rajaraman , K. and Tan , A . -H. 2003. Mining semantic networks for knowledge discovery. In Proceedings of the Third IEEE International Conference on Data Mining. Washington , DC: IEEE . 2003 , 633 -- 636 . Rajaraman, K. and Tan, A.-H. 2003. Mining semantic networks for knowledge discovery. In Proceedings of the Third IEEE International Conference on Data Mining. Washington, DC: IEEE. 2003, 633--636.","journal-title":"DC: IEEE"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1002\/asi.v61:1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/SPW.2012.26"},{"key":"e_1_3_2_1_21_1","first-page":"316","article-title":"2008. Coverage and citation impact of oncological journals in the Web of Science and Scopus","volume":"304","author":"L\u00f3pez-Illescasa F.","year":"2008","unstructured":"C. L\u00f3pez-Illescasa , F. Moya-Aneg\u00f3na and H. F. Moedb . 2008. Coverage and citation impact of oncological journals in the Web of Science and Scopus . Journal of Informetrics . 2008 , 304 -- 316 . C. L\u00f3pez-Illescasa, F. Moya-Aneg\u00f3na and H. F. Moedb. 2008. Coverage and citation impact of oncological journals in the Web of Science and Scopus. Journal of Informetrics. 2008, 304--316.","journal-title":"Journal of Informetrics"},{"doi-asserted-by":"crossref","unstructured":"F. Bao I. R. Chen M. J. Chang and J. H. Cho. 2012. Hierarchical trust management for wireless sensor networks and its applications to trust based routing and intrusion detection. IEEE transactions on network and service management. 2012 9(2): 169--183.  F. Bao I. R. Chen M. J. Chang and J. H. Cho. 2012. Hierarchical trust management for wireless sensor networks and its applications to trust based routing and intrusion detection. IEEE transactions on network and service management. 2012 9(2): 169--183.","key":"e_1_3_2_1_22_1","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1016\/j.comcom.2007.03.008"},{"unstructured":"Dropbox. https:\/\/www.dropbox.com\/s\/9vx78gw06826pn0\/Intrusion%20Detection%20Ontology.jpg?dl=0  Dropbox. https:\/\/www.dropbox.com\/s\/9vx78gw06826pn0\/Intrusion%20Detection%20Ontology.jpg?dl=0","key":"e_1_3_2_1_24_1"}],"event":{"sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"],"acronym":"WI '17","name":"WI '17: International Conference on Web Intelligence 2017","location":"Leipzig Germany"},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3109053","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3109053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:09Z","timestamp":1750217409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3109053"}},"subtitle":["a case study of intrusion detection ontology"],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":24,"alternative-id":["10.1145\/3106426.3109053","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3109053","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}