<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-28T11:35:20Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/3859" metadataPrefix="marc">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/3859</identifier><datestamp>2022-12-20T11:20:01Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_3848</setSpec></header><metadata><record xmlns="http://www.loc.gov/MARC21/slim" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dcterms="http://purl.org/dc/terms/" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<leader>00925njm 22002777a 4500</leader>
<datafield tag="042" ind1=" " ind2=" ">
<subfield code="a">dc</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Sánchez, Raúl</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Herrero Cosío, Álvaro</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Corchado, Emilio</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="c">2013-10</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">Accurate intrusion detection is still an open challenge. The present work aims at being one step toward that purpose by studying the combination of clustering and visualization techniques. To do that, the mobile visualization connectionist agent-based intrusion detection system (MOVICAB-IDS), previously proposed as a hybrid intelligent IDS based on visualization techniques, is upgraded by adding automatic response thanks to clustering methods. To check the validity of the proposed clustering extension, it has been applied to the identification of different anomalous situations related to the simple network management network protocol by using real-life data sets. Different ways of applying neural projection and clustering techniques are studied in the present article. Through the experimental validation it is shown that the proposed techniques could be compatible and consequently applied to a continuous network flow for intrusion detection</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">0196-9722</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">http://hdl.handle.net/10259/3859</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">10.1080/01969722.2013.803903</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Automatic response</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Clustering</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Computational intelligence</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Exploratory projection pursuit</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">k-means</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Network intrusion detection</subfield>
</datafield>
<datafield tag="245" ind1="0" ind2="0">
<subfield code="a">Visualization and clustering for SNMP intrusion detection</subfield>
</datafield>
</record></metadata></record></GetRecord></OAI-PMH>