{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:29:35Z","timestamp":1730251775967,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icnc.2007.573","type":"proceedings-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T18:00:48Z","timestamp":1219860048000},"page":"489-493","source":"Crossref","is-referenced-by-count":2,"title":["Prior Knowledge SVM-based Intrusion Detection Framework"],"prefix":"10.1109","author":[{"given":"Gang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jian","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Zhaohui","family":"Liang","sequence":"additional","affiliation":[]},{"given":"YanGuang","family":"Cai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"year":"0","key":"18"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/ICMSS.2009.5304051"},{"year":"0","key":"14"},{"key":"11","article-title":"Fast training of support vector machines using sequential minimal optimization","author":"piatt","year":"1998","journal-title":"Advances in Kernel Methods - Support Vector Learning"},{"year":"0","key":"12"},{"key":"3","article-title":"Entropy based intrusion detection. PACRIM","volume":"2","author":"yoshida","year":"0","journal-title":"Proc 2003 IEEE Pacific Rim Conference"},{"key":"2","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"1999","journal-title":"Proc 1999 IEEE Symp Security and Privacy"},{"key":"1","article-title":"Probabilistic techniques for intrusion detection based on computer audit data","author":"ye","year":"2001","journal-title":"Proceedings of IEEE -SMC - Systems and Humans"},{"year":"2005","journal-title":"Support Vector Machines Theory and Application","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.jnca.2004.01.003"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TNN.2006.875976"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/ICCCAS.2006.284919"},{"year":"2003","journal-title":"Soft Computing in Communications","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/WI-IATW.2006.50"},{"key":"8","first-page":"200","article-title":"Transductive inference for text classification using support vector machines","author":"joachims","year":"1999","journal-title":"International Conference on Machine Learning (ICML)"}],"event":{"name":"Third International Conference on Natural Computation (ICNC 2007)","start":{"date-parts":[[2007,8,24]]},"location":"Haikou, China","end":{"date-parts":[[2007,8,27]]}},"container-title":["Third International Conference on Natural Computation (ICNC 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4344133\/4344296\/04344401.pdf?arnumber=4344401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T16:37:51Z","timestamp":1489682271000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4344401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icnc.2007.573","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}