{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:12:01Z","timestamp":1725567121771},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259145"},{"type":"electronic","value":"9783540320692"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427469_66","type":"book-chapter","created":{"date-parts":[[2010,9,27]],"date-time":"2010-09-27T19:29:48Z","timestamp":1285615788000},"page":"409-414","source":"Crossref","is-referenced-by-count":6,"title":["Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Rongchang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jeanne","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tungshou","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chunhung","family":"Hsieh","sequence":"additional","affiliation":[]},{"given":"Teyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kaiyang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"2","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion Detection Model. IEEE Trans. Soft. Eng. (SE-13)\u00a02, 222\u2013232 (1987)","journal-title":"IEEE Trans. Soft. Eng., (SE-13)"},{"key":"66_CR2","doi-asserted-by":"crossref","unstructured":"Helmer, G., Wong, J.S.K., Honavar, V., Miller, L.: Automated Discovery of Concise Predictive Rules for Intrusion Detection. J. Sys. & Soft, 165-175 (2002)","DOI":"10.1016\/S0164-1212(01)00088-7"},{"key":"66_CR3","doi-asserted-by":"crossref","unstructured":"Jha, S., Hassan, M.: Building Agents for Rule-based Intrusion Detection System. Comp. Comm, 1366-1373 (2002)","DOI":"10.1016\/S0140-3664(02)00038-5"},{"key":"66_CR4","doi-asserted-by":"crossref","unstructured":"Graham, R.: (March 2000), http:\/\/www.robertgraham.com\/pubs\/network-intrusion-detection.html","DOI":"10.1016\/S1353-4858(00)08021-1"},{"key":"66_CR5","volume-title":"TCP\/IP Protocol Suite","author":"B.A. Forouzan","year":"2000","unstructured":"Forouzan, B.A.: TCP\/IP Protocol Suite. McGraw Hill Pub., New York (2000)"},{"key":"66_CR6","first-page":"561","volume":"2","author":"F. Schwenker","year":"2000","unstructured":"Schwenker, F.: Hierarchical Support Vector Machines for Multi-Class Pattern Recognition. IEEE Knowl.-Based Intel. Eng. Sys. & Allied Tech.\u00a02, 561\u2013565 (2000)","journal-title":"IEEE Knowl.-Based Intel. Eng. Sys. & Allied Tech."},{"key":"66_CR7","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","volume":"2","author":"C.W. Hsu","year":"2002","unstructured":"Hsu, C.W., Lin, C.J.: A Comparison of Methods for Multi-Class Support Vector Machines. IEEE Trans, Neural Networks\u00a02, 415\u2013425 (2002)","journal-title":"IEEE Trans, Neural Networks"},{"key":"66_CR8","unstructured":"http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/"},{"key":"66_CR9","volume-title":"Machine Learning and Data Mining: Methods and Applications","author":"R.S. Michalski","year":"1998","unstructured":"Michalski, R.S., Bratko, I., Kubat, M.: Machine Learning and Data Mining: Methods and Applications. Wiley Pub., Chichester (1998)"},{"key":"66_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4471-0577-0","volume-title":"Genetic Algorithms \u2013 Concepts and Design","author":"K.F. Man","year":"1999","unstructured":"Man, K.F., Tang, K.S., Kwong, S.: Genetic Algorithms \u2013 Concepts and Design, pp. 1\u201330. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks \u2013 ISNN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427469_66.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:56:26Z","timestamp":1605642986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427469_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259145","9783540320692"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11427469_66","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}