iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1016/J.COSE.2008.06.001
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T19:17:43Z","timestamp":1717787863395},"reference-count":18,"publisher":"Elsevier BV","issue":"5-6","license":[{"start":{"date-parts":[[2008,10,1]],"date-time":"2008-10-01T00:00:00Z","timestamp":1222819200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2008,10]]},"DOI":"10.1016\/j.cose.2008.06.001","type":"journal-article","created":{"date-parts":[[2008,6,14]],"date-time":"2008-06-14T08:54:58Z","timestamp":1213433698000},"page":"168-175","source":"Crossref","is-referenced-by-count":60,"title":["Critical study of neural networks in detecting intrusions"],"prefix":"10.1016","volume":"27","author":[{"given":"Rachid","family":"Beghdad","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2008.06.001_bib17","doi-asserted-by":"crossref","unstructured":"Ben Amor N, et\u00a0al. Na\u00efve Bayes vs decision trees in intrusion detection systems. In: The proceeding of the ACM symposium on applied computing, Cyprus; 2004. p. 420\u20134.","DOI":"10.1145\/967900.967989"},{"key":"10.1016\/j.cose.2008.06.001_bib9","unstructured":"Binh Viet N. Self organizing map (SOM) for anomaly detection, ; 2002 [accessed August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib11","unstructured":"Cannady J. Artificial neural networks for misuse detection. In: The proceedings of the 1998 national information systems security conference (NISSC'98), Arlington, VA, ; 1998 [accessed August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib7","unstructured":"Charron F, Ghosh A, Wanken J. Detecting anomalous and unknown intrusions against programs. In: 14th Annual Computer Security Applications Conference ; 1998. p. 259--67 [accessed August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib13","unstructured":"Cunningham R, Lippmann R. Improving intrusion detection performance using keyword selection and neural networks. In: The proceedings of the international symposium on recent advances in intrusion detection, Purdue, IN, ; 1999 [accessed on August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib3","unstructured":"Debar H, Becker M, Siboni D. A neural network component for an intrusion detection system. In: The proceedings of the 1992 IEEE symposium on research in computer security and privacy, Oakland, CA; May 1992. p. 240, 250."},{"issue":"2","key":"10.1016\/j.cose.2008.06.001_bib18","first-page":"161","article-title":"Neural networks learning improvement using the K-means clustering algorithm to detect network intrusions","volume":"3","author":"Faraoun","year":"2006","journal-title":"International Journal of Computational Intelligence"},{"key":"10.1016\/j.cose.2008.06.001_bib4","unstructured":"Ghosh AK, Schwartzbard A. A study in using neural networks for anomaly and misuse detection. In: The proceeding on the 8th USENIX security symposium, ; 1999 [accessed August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib8","unstructured":"Heywood M, Lichodzijewski P, Zincir-Heywood N. Dynamic intrusion detection using self-organizing maps. In: The annual Canadian information technology security symposium, ; 2002 [accessed August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib5","unstructured":"Horeis T. Intrusion detection with neural networks-combination of self-organizing maps and radial basis function networks for human expert integration. Computational Intelligence Society, Research report, ; 2003 [accessed August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib1","series-title":"An introduction to intrusion detection systems","author":"Innella","year":"2001"},{"key":"10.1016\/j.cose.2008.06.001_bib15","unstructured":"KDD data set, ; 1999 [accessed on July 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib16","series-title":"NeuroSolutions, version 5.03","author":"Lefebvre","year":"1994"},{"key":"10.1016\/j.cose.2008.06.001_bib14","unstructured":"Lichodzijewski P, Zincir Heywood AN, Heywood MI. Host-based intrusion detection using self-organizing maps. In: The proceedings of the 2002 IEEE world congress on computational intelligence, Honolulu, HI; 2002. p. 1714\u20139."},{"key":"10.1016\/j.cose.2008.06.001_bib6","first-page":"943","article-title":"Intrusion detection with neural networks\u201d","author":"Lin","year":"1998","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.cose.2008.06.001_bib12","unstructured":"Mukkamala S. Intrusion detection using neural networks and support vector machine. In: The proceedings of the 2002 IEEE international joint conference on neural networks, Honolulu, HI, ; 2002 [accessed August 2006]."},{"key":"10.1016\/j.cose.2008.06.001_bib10","unstructured":"Ryan J, Lin M, Miikkulainen R. Intrusion detection with neural networks. In: AI approaches to fraud detection and risk management: papers from the 1997 AAAI workshop, Providence, RI; 1997. p. 72\u20139."},{"key":"10.1016\/j.cose.2008.06.001_bib2","series-title":"Pattern recognition","author":"Theodorios","year":"1999"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000357?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000357?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T03:38:54Z","timestamp":1557632334000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404808000357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10]]},"references-count":18,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2008,10]]}},"alternative-id":["S0167404808000357"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2008.06.001","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2008,10]]}}}