{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:26:37Z","timestamp":1738819597119,"version":"3.37.0"},"reference-count":14,"publisher":"Academy Publisher","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.6.2.330-340","type":"journal-article","created":{"date-parts":[[2011,2,17]],"date-time":"2011-02-17T14:21:00Z","timestamp":1297952460000},"source":"Crossref","is-referenced-by-count":4,"title":["Improvments of Payload-based Intrusion Detection Models by Using Noise Against Fuzzy SVM"],"prefix":"10.4304","volume":"6","author":[{"given":"Guiling","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yongzhen","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Zhichao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mingjie","family":"E","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2011,2,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0002-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_11"},{"key":"ref3","first-page":"227","article-title":"Anomalous Payload-Based Worm Detection and Signature Generation","volume-title":"Proc. of the 8th Symposium on Recent Advances in Intrusion Detection (RAID)","author":"Wang","year":"2005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_12"},{"issue":"no. 3","key":"ref5","first-page":"195","article-title":"Khandelwal, B. Bruhadeshwar and K. Kishore, \u00e2\u0080\u009canomalous packet detection using. pPartitioned payload","volume":"3","author":"Thorat","year":"2008","journal-title":"Journal of Information Assurance and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.11.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/72.991432"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017467"},{"key":"ref9","first-page":"488","article-title":"Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems","volume-title":"Proceedings of the Sixth International Conference on Data Mining","author":"Perdisci"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2009.12"},{"key":"ref11","first-page":"1","volume-title":"\u00e2\u0080\u009cPayload Content based Network Anomaly Detection\u00e2\u0080\u009d, Centre for Security Theory and Algorithmic Research (CSTAR)","author":"Thorat","year":"2007"},{"key":"ref12","first-page":"911","article-title":"Detection of Anomalous Network Packets using Lightweight Stateless Payload Inspection","volume-title":"Proc. of the Fourth IEEE LCN Workshop on Network Security (WNS 2008)","author":"Nwanze","year":"2008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.31"},{"key":"ref14","first-page":"517","article-title":"Noise-Resistant Payload Anomaly Detection for Network Intrusion Detection Systems","volume-title":"Computing and Communications Conference","author":"Kim","year":"2008"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:10:41Z","timestamp":1738775441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,1]]},"references-count":14,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2011,2,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.6.2.330-340","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2011,2,1]]}}}