{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T05:32:02Z","timestamp":1736400722745,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540335849"},{"type":"electronic","value":"9783540335856"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11739685_89","type":"book-chapter","created":{"date-parts":[[2006,5,4]],"date-time":"2006-05-04T09:55:01Z","timestamp":1146736501000},"page":"851-860","source":"Crossref","is-referenced-by-count":5,"title":["Construction of High Precision RBFNN with Low False Alarm for Detecting Flooding Based Denial of Service Attacks Using Stochastic Sensitivity Measure"],"prefix":"10.1007","author":[{"given":"Wing W. Y.","family":"Ng","sequence":"first","affiliation":[]},{"given":"Aki P. F.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Daniel S.","family":"Yeung","sequence":"additional","affiliation":[]},{"given":"Eric C. C.","family":"Tsang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"89_CR1","unstructured":"Baker, S., Grow, B.: Gambling Sites, This Is A Holdup (2004) Business Week, http:\/\/-www.businessweek.com\/magazine\/content\/04_32\/b3895106_mz063.htm"},{"key":"89_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0953-0","volume-title":"Applications of Data Mining in Computer Security","author":"D. Barbar\u00e1","year":"2002","unstructured":"Barbar\u00e1, D., Jajodia, S.: Applications of Data Mining in Computer Security. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"89_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/11553939_21","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"A.P.F. Chan","year":"2005","unstructured":"Chan, A.P.F., Ng, W.W.Y., Yeung, D.S., Tsang, E.C.C.: Multiple Classifier System with Feature Grouping for Intrusion Detection: Mutual Information Approach. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol.\u00a03683, pp. 141\u2013148. Springer, Heidelberg (2005)"},{"key":"89_CR4","doi-asserted-by":"crossref","unstructured":"Feinstein, L., Schnackenberg, D., Balupari, R., Kindred, D.: Statistical Approaches to DDoS Attack Detection and Response. In: Proc. of the DARPA Information Survivability Conference and Expostion, pp. 303\u2013314 (2003)","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"89_CR5","doi-asserted-by":"crossref","unstructured":"Giorgio, G., Fabio, R., Luca, D.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters, 1795\u20131803 (2003)","DOI":"10.1016\/S0167-8655(03)00004-7"},{"key":"89_CR6","doi-asserted-by":"crossref","unstructured":"Householder, A., Manion, A., Pesante, L., Weaver, G., Thomas, R.: Managing the Threat of Denial-of-Service Attacks. Carnegie Mellon CERT Coordination Ceter, Pittsburgh, PA (October 2001), Online Available, http:\/\/www.cert.org\/archive\/pdf\/Managing_DoS.pdf","DOI":"10.21236\/ADA636482"},{"key":"89_CR7","unstructured":"Jin, S., Yeung, D.S.: DDoS detection based on feature space modeling. In: Proc. of International Conference on Machine Learning and Cybernetics, pp. 4210\u20134215 (2004)"},{"key":"89_CR8","doi-asserted-by":"crossref","unstructured":"Jin, S., Yeung, D.S.: A Covariance Analysis Model for DDoS Attack Detection. In: IEEE Proc. of International Conference on Communications, pp. 1882\u20131886 (2004)","DOI":"10.1109\/ICC.2004.1312847"},{"key":"89_CR9","unstructured":"Kumar, S., Spafford, E.: A pattern matching model for misuse intrusion detection. In: Proceedings of the 17th National Computer Security Conference (1994)"},{"key":"89_CR10","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proceedings of the seventh USENIX Security Symposium (1998)"},{"key":"89_CR11","doi-asserted-by":"crossref","unstructured":"Manikopoulos, C., Papavassiliou, S.: Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Communications Magazine (2002)","DOI":"10.1109\/MCOM.2002.1039860"},{"key":"89_CR12","doi-asserted-by":"crossref","unstructured":"Ng, W.W.Y., Yeung, D.S., Wang, D., Tsang, E.C.C., Wang, X.-Z.: Localized Generalization Error and Its Application to RBFNN Training. In: Proc. of International Conference on Machine Learning and Cybernetics, pp. 4667\u20134673 (2005)","DOI":"10.1109\/ICMLC.2005.1527762"}],"container-title":["Lecture Notes in Computer Science","Advances in Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11739685_89.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T20:21:32Z","timestamp":1736367692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11739685_89"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540335849","9783540335856"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11739685_89","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}