{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T19:17:43Z","timestamp":1717787863395},"reference-count":18,"publisher":"Elsevier BV","issue":"5-6","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1016\/j.cose.2008.06.001","type":"journal-article","created":{"date-parts":[[2008,6,14]],"date-time":"2008-06-14T08:54:58Z","timestamp":1213433698000},"page":"168-175","source":"Crossref","is-referenced-by-count":60,"title":["Critical study of neural networks in detecting intrusions"],"prefix":"10.1016","volume":"27","author":[{"given":"Rachid","family":"Beghdad","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2008.06.001_bib17","doi-asserted-by":"crossref","unstructured":"Ben Amor N, et\u00a0al. Na\u00efve Bayes vs decision trees in intrusion detection systems. In: The proceeding of the ACM symposium on applied computing, Cyprus; 2004. p. 420\u20134.","DOI":"10.1145\/967900.967989"},{"key":"10.1016\/j.cose.2008.06.001_bib9","unstructured":"Binh Viet N. Self organizing map (SOM) for anomaly detection,