<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-18T13:06:38Z</responseDate><request verb="GetRecord" identifier="oai:riubu.ubu.es:10259/7266" metadataPrefix="marc">https://riubu.ubu.es/oai/request</request><GetRecord><record><header><identifier>oai:riubu.ubu.es:10259/7266</identifier><datestamp>2023-01-19T01:05:23Z</datestamp><setSpec>com_10259_3847</setSpec><setSpec>com_10259_5086</setSpec><setSpec>com_10259_2604</setSpec><setSpec>col_10259_3848</setSpec></header><metadata><record xmlns="http://www.loc.gov/MARC21/slim" xmlns:doc="http://www.lyncode.com/xoai" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dcterms="http://purl.org/dc/terms/" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<leader>00925njm 22002777a 4500</leader>
<datafield tag="042" ind1=" " ind2=" ">
<subfield code="a">dc</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Sánchez, Raúl</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Herrero Cosío, Álvaro</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="720" ind1=" " ind2=" ">
<subfield code="a">Corchado, Emilio</subfield>
<subfield code="e">author</subfield>
</datafield>
<datafield tag="260" ind1=" " ind2=" ">
<subfield code="c">2017-02</subfield>
</datafield>
<datafield tag="520" ind1=" " ind2=" ">
<subfield code="a">Much effort has been devoted to research on intrusion detection (ID) in recent years because intrusion strategies and technologies are constantly and quickly evolving. As an innovative solution based on visualization, MObile VIsualisation Connectionist Agent-Based IDS was previously proposed, conceived as a hybrid-intelligent ID System. It was designed to analyse&#xd;
continuous network data at a packet level and is extended in present paper for the analysis of flow-based traffic data. By&#xd;
incorporating clustering techniques to the original proposal, network flows are investigated trying to identify different types&#xd;
of attacks. The analysed real-life data (the well-known dataset from the University of Twente) come from a honeypot directly&#xd;
connected to the Internet (thus ensuring attack-exposure) and is analysed by means of clustering and neural techniques, individually and in conjunction. Promising results are obtained, proving the validity of the proposed extension for the analysis&#xd;
of network flow data</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">1367-0751</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">http://hdl.handle.net/10259/7266</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">10.1093/jigpal/jzw047</subfield>
</datafield>
<datafield tag="024" ind2=" " ind1="8">
<subfield code="a">1368-9894</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Network intrusion detection</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Network flow</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Neural projection</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">Clustering</subfield>
</datafield>
<datafield ind1=" " ind2=" " tag="653">
<subfield code="a">MOVICAB-IDS</subfield>
</datafield>
<datafield tag="245" ind1="0" ind2="0">
<subfield code="a">Clustering extension of MOVICAB-IDS to distinguish intrusions in flow-based data</subfield>
</datafield>
</record></metadata></record></GetRecord></OAI-PMH>