{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:28Z","timestamp":1738777228496,"version":"3.37.0"},"reference-count":16,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.11.2541-2547","type":"journal-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T04:43:27Z","timestamp":1381985007000},"source":"Crossref","is-referenced-by-count":2,"title":["Network Intrusion Detection Technology based on Improved C-means Clustering Algorithm"],"prefix":"10.4304","volume":"8","author":[{"given":"Yanjun","family":"Wang","sequence":"first","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,10,16]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol6.issue3.7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol4.issue4.14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4156\/aiss.vol3.issue8.10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol3.issue11.55"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol8.issue5.71"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol8.issue5.65"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol4.issue2.32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4156\/aiss.vol4.issue2.35"},{"issue":"1","key":"ref9","first-page":"31","article-title":"An intrusion detection system model based on immune principle and performance analysis.","volume":"12","author":"Zhi-xian","year":"2005","unstructured":"[12] CHEN Zhi-xian, WANG Ru-chuan, WANG Shao-di, et al. An intrusion detection system model based on immune principle and performance analysis. The Journal of China Universities of Posts and Telecommunications, 2005, 12(1):31-35.","journal-title":"J China Univ Post Telecommun","ISSN":"https:\/\/id.crossref.org\/issn\/1005-8885","issn-type":"print"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol7.issue1.50"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol7.issue11.29"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol7.issue14.51"},{"issue":"No. 5","key":"ref13","first-page":"1209","article-title":"Wound Infection Recognition Based on Quantum-Behaved Particle Swarm Optimization","volume":"8","author":"Fan","year":"2012","unstructured":"[17] Shu Fan, Fengchun Tian, Qinghua He, Pengfei Jia, Jingwei Feng, Yue Shen, \"Wound Infection Recognition Based on Quantum-Behaved Particle Swarm Optimization,\" Journal of Convergence Information Technology, 2012, Vol. 8, No. 5, pp. 1209-1219.","journal-title":"Journal of Convergence Information Technology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4156\/jcit.vol7.issue22.57"},{"key":"ref15","first-page":"325","article-title":"Particle Swarm Optimization with Particles Having Quantum Behavior","volume-title":"Congress on Evolutionary Computation","author":"Sun","year":"2004","unstructured":"[19] J. Sun, B. Feng, W. B Xu, \"Particle Swarm Optimization with Particles Having Quantum Behavior,\" Proc. 2004 Congress on Evolutionary Computation, pp. 325-331."},{"key":"ref16","first-page":"3049","article-title":"Adaptive Parameter Control for Quantum-behaved ParticleSwarm Optimization on Individual Level","volume-title":"IEEE International Conference","author":"Sun","year":"2005","unstructured":"[20] Jun Sun, Wenbo Xu, Bin Feng, \"Adaptive Parameter Control for Quantum-behaved ParticleSwarm Optimization on Individual Level,\" Systems, Man and Cybernetics, IEEE International Conference, 2005, 4(10-12) pp. 3049-3054."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:03:36Z","timestamp":1738775016000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,16]]},"references-count":16,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2013,10,16]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.11.2541-2547","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,10,16]]}}}