{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:25:24Z","timestamp":1725549924092},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540288336"},{"type":"electronic","value":"9783540319993"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11552499_11","type":"book-chapter","created":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T08:08:46Z","timestamp":1128154126000},"page":"94-102","source":"Crossref","is-referenced-by-count":1,"title":["Using Behavior Knowledge Space and Temporal Information for Detecting Intrusions in Computer Networks"],"prefix":"10.1007","author":[{"given":"L. P.","family":"Cordella","sequence":"first","affiliation":[]},{"given":"I.","family":"Finizio","sequence":"additional","affiliation":[]},{"given":"C.","family":"Mazzariello","sequence":"additional","affiliation":[]},{"given":"C.","family":"Sansone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Vigna, G., Kemmerer, R.: Netstat: a network based intrusion detection system. Journal of Computer Security\u00a07(1) (1999)","DOI":"10.3233\/JCS-1999-7103"},{"key":"11_CR2","unstructured":"Axelsson, S.: Research in Intrusion Detection Systems: A Survey, TR 98-17, Chalmers University of Technology (1999)"},{"key":"11_CR3","unstructured":"Kumar, R., Spafford, E.H.: A Software Architecture to Support Misuse Intrusion Detection. In: Proceedings of the 18th National Information Security Conference, pp. 194\u2013204 (1995)"},{"key":"11_CR4","unstructured":"Ghosh, A.K., Schwartzbard, A.: A Study in Using Neural Networks for Anomaly and Misuse Detection. In: Proc. 8\u2019th USENIX Security Symposium, Washington DC, August 26-29 (1999)"},{"issue":"3","key":"11_CR5","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal Sequence learning and data reduction for anomaly detection. ACM Trans. on Inform. and System Security\u00a02(3), 295\u2013261 (1999)","journal-title":"ACM Trans. on Inform. and System Security"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Inform. System Security\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Transactions on Inform. System Security"},{"key":"11_CR7","unstructured":"Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining Techniques. In: Proceedings of the 7th International Conference on Enterprise Information Systems, Miami (USA), May 24-28, pp. 120\u2013127 (2005)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"S.C. Lee","year":"2001","unstructured":"Lee, S.C., Heinbuch, D.V.: Training a neural Network based intrusion detector to recognize novel attack. IEEE Trans. Syst, Man and Cybernetic, Part-A\u00a031, 294\u2013299 (2001)","journal-title":"IEEE Trans. Syst, Man and Cybernetic, Part-A"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1142\/S0218001403002459","volume":"17","author":"M. Fugate","year":"2003","unstructured":"Fugate, M., Gattiker, J.R.: Computer Intrusion Detection with Classification and Anomaly Detection, using SVMs. International Journal of Pattern Recognition and Artificial Intelligence\u00a017(3), 441\u2013458 (2003)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1016\/S0167-8655(03)00004-7","volume":"24","author":"G. Giacinto","year":"2003","unstructured":"Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters\u00a024, 1795\u20131803 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-44938-8_35","volume-title":"Multiple Classifier Systems","author":"G. Giacinto","year":"2003","unstructured":"Giacinto, G., Roli, F., Didaci, L.: A Modular Multiple Classifier System for the Detection of Intrusions. In: Windeatt, T., Roli, F. (eds.) MCS 2003. LNCS, vol.\u00a02709, pp. 346\u2013355. Springer, Heidelberg (2003)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-540-25966-4_32","volume-title":"Multiple Classifier Systems","author":"L.P. Cordella","year":"2004","unstructured":"Cordella, L.P., Limongiello, A., Sansone, C.: Network Intrusion Detection by a Multi Stage Classification System. In: Roli, F., Kittler, J., Windeatt, T. (eds.) MCS 2004. LNCS, vol.\u00a03077, pp. 324\u2013333. Springer, Heidelberg (2004)"},{"issue":"12","key":"11_CR13","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","volume":"83","author":"S. Singh","year":"2003","unstructured":"Singh, S., Markou, M.: Novelty detection: a review - part 2: neural network based approaches. Signal Processing\u00a083(12), 2499\u20132521 (2003)","journal-title":"Signal Processing"},{"key":"11_CR14","first-page":"943","volume-title":"Advances in Neural Information Processing Systems 10","author":"J. Ryan","year":"1998","unstructured":"Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. In: Jordan, M., et al. (eds.) Advances in Neural Information Processing Systems 10, pp. 943\u2013949. MIT Press, Cambridge (1998)"},{"key":"11_CR15","unstructured":"Labib, K., Vemuri, R.: NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis (2002)"},{"issue":"3","key":"11_CR16","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S. Axelsson","year":"2000","unstructured":"Axelsson, S.: The Base-Rate Fallacy and the Difficulty of Intrusion Detection. ACM Trans. on Information and System Security\u00a03(3), 186\u2013205 (2000)","journal-title":"ACM Trans. on Information and System Security"},{"key":"11_CR17","unstructured":"Cohen, W.W., Singer, Y.: Simple, Fast, and Effective Rule Learner. In: Proc. of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, Orlando, Florida, USA, July 18-22, pp. 335\u2013342 (1999)"},{"issue":"1","key":"11_CR18","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/34.368145","volume":"17","author":"Y.S. Huang","year":"1995","unstructured":"Huang, Y.S., Suen, C.Y.: A Method of Combining Multiple Experts for the Recognition of Unconstrained Handwritten Numerals. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a017(1), 90\u201394 (1995)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"11_CR19","series-title":"Neural Network Systems Techniques and Applications","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/S1874-5946(98)80029-1","volume-title":"Image Processing and Pattern Recognition","author":"L.P. Cordella","year":"1998","unstructured":"Cordella, L.P., Sansone, C., Tortorella, F., Vento, M., De Stefano, C.: Neural Network Classification Reliability: Problems and Applications. In: Image Processing and Pattern Recognition. Neural Network Systems Techniques and Applications, vol.\u00a05, pp. 161\u2013200. Academic Press, San Diego (1998)"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Chen, K., Liao, X., Zhang, W.: A genetic clustering method for intrusion detection. Pattern Recognition\u00a037 (2004)","DOI":"10.1016\/j.patcog.2003.09.011"},{"issue":"4","key":"11_CR21","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"4","key":"11_CR22","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/90.944338","volume":"9","author":"V. Paxson","year":"2001","unstructured":"Paxson, V., Floyd, S.: Difficulties in simulating the internet. IEEE\/ACM Transactions on Networking\u00a09(4), 392\u2013403 (2001)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"11_CR23","unstructured":"Mahoney, M.: A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic, PhD thesis, Florida Institute of Technology (2003)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Image Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11552499_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:03:30Z","timestamp":1619507010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11552499_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540288336","9783540319993"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11552499_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}