{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:01:53Z","timestamp":1729638113144,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122818","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"192-197","source":"Crossref","is-referenced-by-count":48,"title":["Intrusion detection based on k-means clustering and OneR classification"],"prefix":"10.1109","author":[{"given":"Z.","family":"Muda","sequence":"first","affiliation":[]},{"given":"W.","family":"Yassin","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Sulaiman","sequence":"additional","affiliation":[]},{"given":"N. I.","family":"Udzir","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1002\/int.20203"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2008.06.001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2007.02.007"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.01.008"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.06.138"},{"key":"13","first-page":"281","article-title":"Traffic classification using clustering algorithms","author":"luigi","year":"2006","journal-title":"Proceedings of the ACM SIGCOMM Conference on Applications Technologies Architectures and Protocols for Computer Communications"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.09.045"},{"journal-title":"Neuro-Fuzzy and Soft Computing A Computational Approach to Learning and Machine Intelligence","year":"1996","author":"jang","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2009.05.017"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0002-5"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.09.005"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.10.146"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.002"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.025"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.01.023"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.02.014"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022631118932"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.4"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.07.002"},{"key":"10","doi-asserted-by":"crossref","first-page":"2373","DOI":"10.1016\/j.patcog.2006.12.009","article-title":"Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection","volume":"40","author":"tsang","year":"2007","journal-title":"Pattern Recognition"},{"journal-title":"Intrusion Detection & Prevention","year":"2004","author":"endorf","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022631118932"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.843274"},{"key":"6","first-page":"120","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"0","journal-title":"Proc 1999 IEEE Symp Security and Privacy"},{"journal-title":"KDD Cup 1999 Intrusion Detectection Dataset","year":"0","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382914"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.09.011"},{"key":"9","first-page":"385","article-title":"Parzen-Window network intrusion detectors","author":"yeung","year":"0","journal-title":"Proceedings 16th International Conference Pattern Recognition 2002"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846201"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2011,12,5]]},"location":"Melacca, Malaysia","end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122818.pdf?arnumber=6122818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:36:57Z","timestamp":1497947817000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122818\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122818","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}