{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:45:20Z","timestamp":1729665920703,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/isbast.2014.7013127","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:34:53Z","timestamp":1421868893000},"page":"232-237","source":"Crossref","is-referenced-by-count":10,"title":["Signature-Based Anomaly intrusion detection using Integrated data mining classifiers"],"prefix":"10.1109","author":[{"given":"Warusia","family":"Yassin","sequence":"first","affiliation":[]},{"given":"Nur Izura","family":"Udzir","sequence":"additional","affiliation":[]},{"given":"Azizol","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Mohd Taufik","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Hazura","family":"Zulzalil","sequence":"additional","affiliation":[]},{"given":"Zaiton","family":"Muda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.3.9.68-76"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2012.10.006"},{"key":"3","first-page":"298","article-title":"Anomaly-based intrusion detection through k-means clustering and naives bayes classification","author":"yassin","year":"2013","journal-title":"Proceedings of the 4th International Conference on Computing and Informatics ICOCI 2013"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.04.038"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.01.013"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/b98227","volume":"3077","author":"roli","year":"2004","journal-title":"Multiple Classifier Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.089"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-011-0644-y"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2013.2167.2173"},{"key":"9","article-title":"Ensemble of soft computing techniques for intrusion detection","volume":"13","author":"deepika veerwal","year":"2013","journal-title":"GJCST-E Network Web & Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198832"}],"event":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","start":{"date-parts":[[2014,8,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 International Symposium on Biometrics and Security Technologies (ISBAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994953\/7013076\/07013127.pdf?arnumber=7013127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:03:22Z","timestamp":1498190602000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isbast.2014.7013127","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}