{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:45:27Z","timestamp":1725565527662},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221449"},{"type":"electronic","value":"9783540259664"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25966-4_32","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:54:01Z","timestamp":1284170041000},"page":"324-333","source":"Crossref","is-referenced-by-count":12,"title":["Network Intrusion Detection by a Multi-stage Classification System"],"prefix":"10.1007","author":[{"given":"Luigi Pietro","family":"Cordella","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Limongiello","sequence":"additional","affiliation":[]},{"given":"Carlo","family":"Sansone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Axelsson, S.: Research in Intrusion Detection Systems: A Survey, TR 98-17, Chalmers University of Technology (1999)"},{"key":"32_CR2","unstructured":"Kumar, R., Spafford, E.H.: A Software Architecture to Support Misuse Intrusion Detection. In: Proceedings of the 18th National Information Security Conference, pp. 194\u2013204 (1995)"},{"key":"32_CR3","unstructured":"Ghosh, A.K., Schwartzbard, A.: A Study in Using Neural Networks for Anomaly and Misuse Detection. In: Proc. 8\u2019th USENIX Security Symposium, Washington DC, August 26-29 (1999)"},{"issue":"3","key":"32_CR4","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal Sequence learning and data reduction for anomaly detection. ACM Trans. on Inform. and System Security\u00a02(3), 261\u2013295 (1999)","journal-title":"ACM Trans. on Inform. and System Security"},{"key":"32_CR5","unstructured":"Kendall, K.: A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, Master\u2019s Thesis, Massachusetts Institute of Technology (1998)"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1016\/S0167-8655(03)00004-7","volume":"24","author":"G. Giacinto","year":"2003","unstructured":"Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters\u00a024, 1795\u20131803 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C. Elkan","year":"2000","unstructured":"Elkan, C.: Results of the KDD99 classifier learning. KDD 1999\u00a01, 63\u201364 (2000)","journal-title":"ACM SIGKDD Explorations"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"S.C. Lee","year":"2001","unstructured":"Lee, S.C., Heinbuch, D.V.: Training a neural Network based intrusion detector to recognize novel attack. IEEE Trans. Syst, Man., and Cybernetic, Part-A\u00a031, 294\u2013299 (2001)","journal-title":"IEEE Trans. Syst, Man., and Cybernetic, Part-A"},{"issue":"3","key":"32_CR9","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1142\/S0218001403002459","volume":"17","author":"M. Fugate","year":"2003","unstructured":"Fugate, M., Gattiker, J.R.: Computer Intrusion Detection with Classification and Anomaly Detection, using SVMs. International Journal of Pattern Recognition and artificial Intelligence\u00a017(3), 441\u2013458 (2003)","journal-title":"International Journal of Pattern Recognition and artificial Intelligence"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/3-540-44938-8_35","volume-title":"Multiple Classifier Systems","author":"G. Giacinto","year":"2003","unstructured":"Giacinto, G., Roli, F., Didaci, L.: A Modular Multiple Classifier System for the Detection of Intrusions. In: Windeatt, T., Roli, F. (eds.) MCS 2003. LNCS, vol.\u00a02709, pp. 346\u2013355. Springer, Heidelberg (2003)"},{"key":"32_CR11","volume-title":"Snort 2.0 Intrusion Detection","author":"J. Beale","year":"2003","unstructured":"Beale, J., Foster, J.C.: Snort 2.0 Intrusion Detection. Syngress Publishing, Inc., Rockland (2003)"},{"key":"32_CR12","first-page":"161","volume-title":"Academic Press theme volumes on Neural Network Systems, Techniques and Applications","author":"L.P. Cordella","year":"1998","unstructured":"Cordella, L.P., Sansone, C., Tortorella, F., Vento, M., De Stefano, C.: Neural Networks Classification Reliability. In: Leondes, C.T. (ed.) Academic Press theme volumes on Neural Network Systems, Techniques and Applications, vol.\u00a05, pp. 161\u2013199. Academic Press, London (1998)"},{"issue":"6","key":"32_CR13","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1142\/S0218001401001210","volume":"15","author":"C. Sansone","year":"2001","unstructured":"Sansone, C., Tortorella, F., Vento, M.: A Classification Reliability Driven Reject Rule for Multi-Expert Systems. International Journal of Pattern Recognition and Artificial Intelligence\u00a015(6), 885\u2013904 (2001)","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"4","key":"32_CR14","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Inform. System Security\u00a03(4), 227\u2013261 (2000)","journal-title":"ACM Transactions on Inform. System Security"}],"container-title":["Lecture Notes in Computer Science","Multiple Classifier Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25966-4_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:20:05Z","timestamp":1620012005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25966-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221449","9783540259664"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25966-4_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}