{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:35:45Z","timestamp":1725806145076},"publisher-location":"Cham","reference-count":0,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117096"},{"type":"electronic","value":"9783319117102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11710-2_2","type":"book-chapter","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T06:16:50Z","timestamp":1412576210000},"page":"11-23","source":"Crossref","is-referenced-by-count":14,"title":["A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Demertzis","sequence":"first","affiliation":[]},{"given":"Lazaros","family":"Iliadis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,7]]},"container-title":["Communications in Computer and Information Science","E-Democracy, Security, Privacy and Trust in a Digital World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11710-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T16:38:23Z","timestamp":1669135103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11710-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117096","9783319117102"],"references-count":0,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11710-2_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}