iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.COSE.2008.04.004
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T19:34:33Z","timestamp":1694633673862},"reference-count":45,"publisher":"Elsevier BV","issue":"3-4","license":[{"start":{"date-parts":[[2008,5,1]],"date-time":"2008-05-01T00:00:00Z","timestamp":1209600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2008,5]]},"DOI":"10.1016\/j.cose.2008.04.004","type":"journal-article","created":{"date-parts":[[2008,5,11]],"date-time":"2008-05-11T08:07:22Z","timestamp":1210493242000},"page":"84-100","source":"Crossref","is-referenced-by-count":10,"title":["A feasible intrusion detector for recognizing IIS attacks based on neural networks"],"prefix":"10.1016","volume":"27","author":[{"given":"Shi-Jinn","family":"Horng","sequence":"first","affiliation":[]},{"given":"Pingzhi","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Yao-Ping","family":"Chou","sequence":"additional","affiliation":[]},{"given":"Yen-Cheng","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Pan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2008.04.004_bib1","series-title":"Computer security threat monitoring and surveillance. Technical report","author":"Anderson","year":"1980"},{"key":"10.1016\/j.cose.2008.04.004_bib2","series-title":"arachNIDS: advanced reference archive of current heuristics for network intrusion detection systems","year":"2004"},{"key":"10.1016\/j.cose.2008.04.004_bib3","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1145\/357830.357849","article-title":"The base-rate fallacy and the difficulty of intrusion detection","volume":"3","author":"Axelsson","year":"2000","journal-title":"ACM Transaction Information and System Security"},{"key":"10.1016\/j.cose.2008.04.004_bib4","article-title":"Network-based intrusion detection using neural networks","volume":"vol. 12","author":"Bivens","year":"2002"},{"key":"10.1016\/j.cose.2008.04.004_bib13","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/IJCNN.1998.682263","article-title":"Neural network applied in intrusion detection","volume":"1","author":"Bonifacio","year":"1998","journal-title":"IEEE International Joint Conference on Neural Networks"},{"issue":"2","key":"10.1016\/j.cose.2008.04.004_bib5","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TSMCC.2002.801356","article-title":"Incorporating soft computing techniques into a probabilistic intrusion detection system","volume":"32","author":"Cho","year":"2002","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)"},{"key":"10.1016\/j.cose.2008.04.004_bib6","unstructured":"Cong B. Implementation of real time intelligent intrusion detection systems. Proceedings of the ISCA 17th international conference computers and their applications; 2002. p. 450\u20133."},{"key":"10.1016\/j.cose.2008.04.004_bib7","unstructured":"Debar Herv\u00e9, Becker Monique, Siboni Didier. A neural network component for an intrusion detection. Proceedings of the IEEE computer society symposium detection system; May 1992. p.\u00a0240\u201350."},{"key":"10.1016\/j.cose.2008.04.004_bib8","first-page":"301","article-title":"Fuzzy network profiling for intrusion detection","author":"Dickerson","year":"2000","journal-title":"IEEE Network"},{"key":"10.1016\/j.cose.2008.04.004_bib9","unstructured":"Draelos T, Duggan D, Collins M, Wunsch D. Adaptive critic designs for host-based intrusion detection. Proceedings of the 2002 international joint conference on neural networks. IJCNN'02 (Cat. No.02CH37290), vol. 2; 2002. p. 1720\u20135."},{"key":"10.1016\/j.cose.2008.04.004_bib10","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0165-0114(84)90097-6","article-title":"Generalized means as model of compensative connectives","volume":"14","author":"Dyckhoff","year":"1984","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/j.cose.2008.04.004_bib14","unstructured":"Estevez-Tapiador Juan M, Garcia-Teodoro Pedro, Diaz-Verdejo Jesus E. Detection of web-based attacks through markovian protocol parsing. ISCC, 10th IEEE symposium on computers and communications (ISCC'05); 2005. p. 457\u201362."},{"key":"10.1016\/j.cose.2008.04.004_bib11","volume":"vol. 1","author":"Feller","year":"1968"},{"key":"10.1016\/j.cose.2008.04.004_bib12","doi-asserted-by":"crossref","unstructured":"Heberlein L, Dias G, Levitt K, Mukherjee B, Wood J, Wolber D. A network security monitor. Proceedings of the 1990 IEEE symposium on research in security and privacy; May 1990. p. 296\u2013304.","DOI":"10.1109\/RISP.1990.63859"},{"issue":"3","key":"10.1016\/j.cose.2008.04.004_bib15","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/0925-2312(94)00013-I","article-title":"Optimal design of neural networks using the Taguchi method","volume":"7","author":"Khaw","year":"1995","journal-title":"Neurocomputing"},{"key":"10.1016\/j.cose.2008.04.004_bib16","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/S0924-0136(98)00152-6","article-title":"Methodology of preform design considering workability in metal forming by the artificial neural network and Taguchi method","volume":"80\u201381","author":"Ko","year":"1998","journal-title":"Journal of Materials Processing Technology"},{"key":"10.1016\/j.cose.2008.04.004_bib17","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1016\/j.comnet.2005.01.009","article-title":"A multi-model approach to the detection of web-based attacks","volume":"48","author":"Kruegel","year":"2005","journal-title":"Computer Networks"},{"key":"10.1016\/j.cose.2008.04.004_bib18","series-title":"Classification and detection of computer intrusions","author":"Kumar","year":"1995"},{"issue":"4","key":"10.1016\/j.cose.2008.04.004_bib19","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/3468.935046","article-title":"Training a neural-network based intrusion detector to recognize novel attacks","volume":"31","author":"Lee","year":"2001","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part A Systems and Humans"},{"issue":"10","key":"10.1016\/j.cose.2008.04.004_bib20","first-page":"1235","article-title":"Application of fuzzy neural networks to intrusion detection","volume":"23","author":"Li","year":"2002","journal-title":"Mini-Micro Systems"},{"key":"10.1016\/j.cose.2008.04.004_bib21","first-page":"53","article-title":"Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters","author":"Li","year":"2003","journal-title":"IEEE Systems Man and Cybernetics Society Information Assurance Workshop"},{"key":"10.1016\/j.cose.2008.04.004_bib22","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1016\/S1389-1286(00)00140-7","article-title":"Improving intrusion detection performance using keyword selection and neural networks","volume":"34","author":"Lippmann","year":"2000","journal-title":"Computer Network"},{"issue":"4","key":"10.1016\/j.cose.2008.04.004_bib23","first-page":"579","article-title":"The 1999 DARPA off-line intrusion detection evaluation computer networks","volume":"34","author":"Lippmann","year":"2000","journal-title":"Computer Networks The International Journal of Computer and Telecommunications Networking"},{"key":"10.1016\/j.cose.2008.04.004_bib24","unstructured":"Liu Z, Florez F, Bridges SM. A comparison of input representations in neural networks: a case study in intrusion detection. Proceedings of the 2002 international joint conference on neural networks (IJCNN'02), vol. 2; 2002. p. 1708\u201313."},{"key":"10.1016\/j.cose.2008.04.004_bib25","unstructured":"Lunt TF, Tamaru A, Gilham F. IDES: a progress report. Proceedings of the sixth annual computer security applications conference, Tucson, AZ; December 1990. p. 273\u201385."},{"key":"10.1016\/j.cose.2008.04.004_bib26","unstructured":"MATLAB Quick-Start Guide. Available from: http:\/\/web.mit.edu\/vchudnov\/www\/matlab.html."},{"key":"10.1016\/j.cose.2008.04.004_bib27","series-title":"Cross-validation for detecting and preventing overfitting","author":"Moore","year":"2001"},{"key":"10.1016\/j.cose.2008.04.004_bib28","series-title":"Languages and tools for rule-base distributed intrusion detection","author":"Mounji","year":"1997"},{"key":"10.1016\/j.cose.2008.04.004_bib29","unstructured":"Nessus. Available from: http:\/\/www.nessus.org; 2004."},{"issue":"4","key":"10.1016\/j.cose.2008.04.004_bib30","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1109\/72.392257","article-title":"Using Taguchi's method of experimental design to control errors in layered perceptrons","volume":"6","author":"Peterson","year":"1995","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/j.cose.2008.04.004_bib31","series-title":"A state transition analysis tool for intrusion detection","author":"Porras","year":"1992"},{"key":"10.1016\/j.cose.2008.04.004_bib32","unstructured":"RFC 2616 Hypertext Transfer Protocol-HTTP\/1.1."},{"key":"10.1016\/j.cose.2008.04.004_bib33","series-title":"Intrusion detection with neural networks","author":"Ryan","year":"1998"},{"key":"10.1016\/j.cose.2008.04.004_bib34","first-page":"1","article-title":"Data mining methods for detection of new malicious executables","author":"Schultz","year":"2001","journal-title":"IEEE Symposium on Security and Privacy Oakland CA"},{"key":"10.1016\/j.cose.2008.04.004_bib35","unstructured":"Snapp SR, Brentano J, Dias GV, Heberlein LT, Ho C, Levitt KN, Mukherjee B. DIDS \u2013 motivation, architecture, and an early prototype. Proceedings of the 14th national computer security conference, Baltimore, MD; Oct. 1991. p. 167\u201376."},{"key":"10.1016\/j.cose.2008.04.004_bib36","unstructured":"Snort. Available from: http:\/\/www.snort.org\/."},{"key":"10.1016\/j.cose.2008.04.004_bib37","series-title":"Honeypots: definitions and value of honeypots","author":"Spitzner","year":"2002"},{"key":"10.1016\/j.cose.2008.04.004_bib38","unstructured":"Sung AH, Mukkamala S. Identifying important features for intrusion detection using support vector machines and neural networks. Proceedings 2003 symposium on applications and the Internet; 2003. p. 209\u201316."},{"issue":"15","key":"10.1016\/j.cose.2008.04.004_bib39","doi-asserted-by":"crossref","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","article-title":"Intrusion detection techniques and approaches","volume":"25","author":"Verwoerd","year":"2002","journal-title":"Computer Communications"},{"issue":"2","key":"10.1016\/j.cose.2008.04.004_bib40","first-page":"223","article-title":"Neural-Taguchi method for robust design analysis","volume":"19","author":"Wang","year":"1998","journal-title":"Journal of the Chinese Society of Mechanical Engineers"},{"key":"10.1016\/j.cose.2008.04.004_bib41","unstructured":"Winpcap. Available from: http:\/\/winpcap.polito.it\/."},{"issue":"7","key":"10.1016\/j.cose.2008.04.004_bib42","first-page":"45","article-title":"Internet intrusion detection based on intelligent neural network system","volume":"12","author":"Xiao","year":"2002","journal-title":"High Technology Letters"},{"key":"10.1016\/j.cose.2008.04.004_bib43","doi-asserted-by":"crossref","unstructured":"Yamada Akira, Miyake Yutaka, Takemori Keisuke, Tanaka Toshiaki. Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data. Proceedings of the international conference on information technology: coding and computing (ITCC'05); 2005.","DOI":"10.1109\/ITCC.2005.178"},{"key":"10.1016\/j.cose.2008.04.004_bib45","unstructured":"Zhang Jin-Wei. The study and implementation of intrusion detection and security policy management system based on network topology, Master thesis, National Cheng Kung University, Taiwan; July 2007."},{"issue":"4","key":"10.1016\/j.cose.2008.04.004_bib44","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1111\/j.1540-5915.2001.tb00975.x","article-title":"Data mining for network intrusion detection: a comparison of alternative methods","volume":"32","author":"Zhu","year":"2001","journal-title":"Decision Sciences Journal"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000114?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000114?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T07:08:35Z","timestamp":1656227315000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404808000114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5]]},"references-count":45,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2008,5]]}},"alternative-id":["S0167404808000114"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2008.04.004","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2008,5]]}}}