{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T23:11:33Z","timestamp":1720221093043},"reference-count":10,"publisher":"Maria Curie-Sklodowska University","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,1,1]]},"DOI":"10.2478\/v10065-010-0035-7","type":"journal-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T12:47:39Z","timestamp":1302180459000},"source":"Crossref","is-referenced-by-count":5,"title":["Analysis of neural networks usage for detection of a new attack in IDS"],"prefix":"10.17951","volume":"10","author":[{"given":"Przemys\u0142aw","family":"Kukie\u0142ka","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zbigniew","family":"Kotulski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7349","reference":[{"issue":"4","key":"1","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/382912.382914","article-title":"A framework for constructing features and models for intrusion detection systems","volume":"3","author":"W. Lee","year":"2000","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"2","volume-title":"Metody i Techniki Sztucznej Inteligencji (in Polish)","author":"L. Rutkowski","year":"2005"},{"key":"3","article-title":"Data mining approaches for intrusion detection","author":"W. Lee","year":"1998"},{"key":"4","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","article-title":"The 1999 darpa off-line intrusion detection evaluation","volume":"34","author":"R. Lippmann","year":"2000","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"5","article-title":"Bro: A system for detecting network intruder in real time","author":"V. Paxson","year":"1998"},{"key":"6","doi-asserted-by":"crossref","unstructured":"Elkan Ch., Results of the KDD'99 classifier-learning contest (1999) <a target=\"_blank\" href='http:\/\/www.cse.ucsd.edu\/#elkan\/clresults.html'>http:\/\/www.cse.ucsd.edu\/#elkan\/clresults.html<\/a>","DOI":"10.1145\/846183.846199"},{"key":"7","volume-title":"Sieci Neuronowe do Przetwarzania Informacji (in Polish)","author":"S. Osowski","year":"2000"},{"key":"8","first-page":"20","author":"P. Kukielka","year":"2008"},{"key":"9","unstructured":"The Metasploit Project <a target=\"_blank\" href='http:\/\/www.metasploit.com'>www.metasploit.com<\/a>"},{"key":"10","unstructured":"Bro-Intrusion Detection System <a target=\"_blank\" href='http:\/\/www.bro-ids.org'>www.bro-ids.org<\/a>"}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3267\/2461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T15:47:30Z","timestamp":1653493650000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3267"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,1]]},"references-count":10,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.2478\/v10065-010-0035-7","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2010,1,1]]}}}