{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:15:14Z","timestamp":1725498914177},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540749714"},{"type":"electronic","value":"9783540749721"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74972-1_16","type":"book-chapter","created":{"date-parts":[[2007,12,21]],"date-time":"2007-12-21T05:23:12Z","timestamp":1198214592000},"page":"112-119","source":"Crossref","is-referenced-by-count":4,"title":["Data Security Analysis Using Unsupervised Learning and Explanations"],"prefix":"10.1007","author":[{"given":"G.","family":"Corral","sequence":"first","affiliation":[]},{"given":"E.","family":"Armengol","sequence":"additional","affiliation":[]},{"given":"A.","family":"Fornells","sequence":"additional","affiliation":[]},{"given":"E.","family":"Golobardes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Peltier TR, Peltier J (2003) Managing a Network Vulnerability Assessment. CRC Press, Inc","DOI":"10.1201\/9780203503041"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Eskin E, Arnold A, Prerau M (2002) A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Data Mining for Security Applications","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"16_CR3","first-page":"157","volume":"131","author":"G. Corral","year":"2005","unstructured":"Corral G, Golobardes E, Andreu O, Serra I (2005) Application of clustering techniques in a network security testing system. AI Research and Development, IOS Press, 131:157\u2013164","journal-title":"AI Research and Development"},{"key":"16_CR4","first-page":"241","volume":"4106","author":"A. Fornells","year":"2006","unstructured":"Fornells A, Golobardes E, Vernet D, Corral G (2006) Unsupervised case memory organization: Analysing computational time and soft computing capabilities. In 8th European Conference on CBR, LNAI Springer-Verlag, 4106:241\u2013255","journal-title":"8th European Conference on CBR"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"100","DOI":"10.2307\/2346830","volume":"28","author":"J. Hartigan","year":"1979","unstructured":"Hartigan J, Wong M (1979) A k-means clustering algorithm. Applied Statistics, 28:100\u2013108","journal-title":"Applied Statistics"},{"key":"16_CR6","volume-title":"Springer Series in Information Sciences","author":"T. Kohonen","year":"1989","unstructured":"Kohonen T (1989) Self-Organization and Associative Memory. In: Springer Series in Information Sciences, Springer, Berlin, vol 8"},{"key":"16_CR7","unstructured":"Corral G, Zaballos A, Cadenas X, Gran\u00e9 A (2005) A distributed security system for an intranet. In 39th IEEE Carnahan Conference on Security Technology, pp 291\u2013294"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1023\/A:1007677713969","volume":"41","author":"E. Armengol","year":"2000","unstructured":"Armengol E, Plaza E (2000) Bottom-up induction of feature terms. Machine Learning 41(1):259\u2013294","journal-title":"Machine Learning"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1145\/950191.950192","volume":"6","author":"K. Julisch","year":"2003","unstructured":"Julisch K (2003) Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6:443\u2013471","journal-title":"ACM Transactions on Information and System Security"},{"key":"16_CR10","unstructured":"Leung K, Leckie C (2005) Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of 28th Australasian CS Conference, vol 38"},{"key":"16_CR11","unstructured":"Marchette D (1999) A statistical method for profiling network traffic. In: 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pp 119\u2013128"},{"key":"16_CR12","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-540-45248-5_3","volume":"2820","author":"M. Ramadas","year":"2003","unstructured":"Ramadas M, Ostermann S, Tjaden BC (2003) Detecting anomalous network traffic with SOMs. In: 6th Symposium on Recent Advances in Intrusion Detection, 2820: 36\u201354","journal-title":"6th Symposium on Recent Advances in Intrusion Detection"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Depren M, Topallar M (2004) Network-based anomaly intrusion detection system using SOMs. In: IEEE 12th Signal Processing and Communications Applications, pp 76\u201379","DOI":"10.1109\/SIU.2004.1338261"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"DeLooze L (2004) Classification of computer attacks using a self-organizing map. In: Proceedings of the 2004 IEEE Workshop on Information Assurance, pp 365\u2013369","DOI":"10.1109\/IAW.2004.1437840"},{"key":"16_CR15","first-page":"1001","volume":"25","author":"E. Armengol","year":"2006","unstructured":"Armengol E, Plaza E (2006) Symbolic Explanation of Similarities in CBR. Computing and Informatics 25:1001\u20131019","journal-title":"Computing and Informatics"},{"key":"16_CR16","unstructured":"Cheeseman P, Stutz J (1996) Bayesian classification (autoclass): Theory and results. Advances in Knowledge Discovery and Data Mining, pp 153\u2013180"},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/11875581_59","volume":"4224","author":"G. Corral","year":"2006","unstructured":"Corral G, Fornells A, Golobardes E, Abella J (2006) Cohesion factors: improving the clustering capabilities of Consensus. Intelligent Data Engineering and Automated Learning, LNCS Springer, 4224:488\u2013495","journal-title":"Intelligent Data Engineering and Automated Learning"},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/01969727408546059","volume":"4","author":"J. Dunn","year":"1974","unstructured":"Dunn J (1974) Well separated clusters and optimal fuzzy partitions. Journal of Cybernetics 4:95\u2013104","journal-title":"Journal of Cybernetics"},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TPAMI.1979.4766909","volume":"4","author":"D.L. Davies","year":"1979","unstructured":"Davies DL, Bouldin DW (1979) A cluster separation measure. IEEE Transactions on Pattern Analysis and Machine Learning 4:224\u2013227","journal-title":"IEEE Transactions on Pattern Analysis and Machine Learning"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"P. Rousseeuw","year":"1987","unstructured":"Rousseeuw P (1987) Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20:53\u201365","journal-title":"Journal of Computational and Applied Mathematics"}],"container-title":["Advances in Soft Computing","Innovations in Hybrid Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74972-1_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:49:34Z","timestamp":1619520574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74972-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540749714","9783540749721"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74972-1_16","relation":{},"ISSN":["1867-5662"],"issn-type":[{"type":"print","value":"1867-5662"}],"subject":[],"published":{"date-parts":[[2007]]}}}