{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:22:39Z","timestamp":1768681359338,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540259145","type":"print"},{"value":"9783540320692","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427469_67","type":"book-chapter","created":{"date-parts":[[2010,9,27]],"date-time":"2010-09-27T19:29:48Z","timestamp":1285615788000},"page":"415-420","source":"Crossref","is-referenced-by-count":26,"title":["Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Dong Seong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ha-Nam","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Syng-Yup","family":"Ohn","sequence":"additional","affiliation":[]},{"given":"Jong Sou","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","doi-asserted-by":"crossref","unstructured":"Chen, X.: Gene Selection for Cancer Classification Using Bootstrapped Genetic Algorithms and Support Vector Machines. In: The Computational Systems Bioinformatics Conference, pp. 504\u2013505 (2003)","DOI":"10.1109\/CSB.2003.1227389"},{"key":"67_CR2","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., et al.: Pattern Classification, 2nd edn. Wiley Interscience Inc., Hoboken (2001)","edition":"2"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Frohlich, H., et al.: Feature Selection for Support Vector Machines by Means of Genetic Algorithm. Tools with Artificial Intelligence, 142\u2013148 (2003)","DOI":"10.1109\/TAI.2003.1250182"},{"key":"67_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-45665-1_15","volume-title":"Pattern Recognition with Support Vector Machines","author":"M. Fugate","year":"2002","unstructured":"Fugate, M., et al.: Anomaly Detection Enhanced Classification in Computer Intrusion Detection. In: Lee, S.-W., Verri, A. (eds.) SVM 2002. LNCS, vol.\u00a02388, pp. 186\u2013197. Springer, Heidelberg (2002)"},{"key":"67_CR5","unstructured":"Hu, W., et al.: Robust Support Vector Machines for Anomaly Detection in Computer Security. In: Proc. of Int. Conf. on Machine Learning and Applications 2003, pp. 168\u2013174. CSREA Press (2003)"},{"key":"67_CR6","unstructured":"KDD-CUP-99 Task Description: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.html"},{"key":"67_CR7","unstructured":"KDD Cup 1999 Data.: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"67_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/978-3-540-45235-5_73","volume-title":"Information Networking","author":"D.S. Kim","year":"2003","unstructured":"Kim, D.S., Park, J.S.: Network-based Intrusion Detection with Support Vector Machines. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol.\u00a02662, pp. 747\u2013756. Springer, Heidelberg (2003)"},{"key":"67_CR9","doi-asserted-by":"crossref","unstructured":"Kruegel, C., et al.: Stateful Intrusion Detection for High-Speed Networks. In: Proc. of the IEEE Symposium on Research on Security and Privacy, pp. 285\u2013293 (2002)","DOI":"10.1109\/SECPRI.2002.1004378"},{"key":"67_CR10","volume-title":"Introduction to Genetic Algorithms","author":"M. Mitchell","year":"1999","unstructured":"Mitchell, M.: Introduction to Genetic Algorithms. MIT Press, Cambridge (1999)"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., et al.: Intrusion Detection Using Neural Networks and Support Vector Machines. In: Proc. of IEEE Int. Joint Conf. on Neural Networks, pp. 1702\u20131707 (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"67_CR12","volume-title":"Proc. of the 82nd Annual Meeting of the Transportation Research Board","author":"S. Mukkamala","year":"2003","unstructured":"Mukkamala, S., Sung, A.H.: Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines. In: Proc. of the 82nd Annual Meeting of the Transportation Research Board, National Academics, Washington (2003)"},{"key":"67_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1007\/978-3-540-30497-5_138","volume-title":"Computational and Information Science","author":"S.-Y. Ohn","year":"2004","unstructured":"Ohn, S.-Y., et al.: Determining Optimal Decision Model for Support Vector Machine by Genetic Algorithm. In: Zhang, J., He, J.-H., Fu, Y. (eds.) CIS 2004. LNCS, vol.\u00a03314, pp. 895\u2013902. Springer, Heidelberg (2004)"},{"key":"67_CR14","unstructured":"Park, J.S., et al.: Using Support Vector Machine to Detect the Host-based Intrusion IRC. In: Int. Conf. on Internet Information Retrieval, pp. 172\u2013178 (2002)"},{"key":"67_CR15","doi-asserted-by":"crossref","unstructured":"Pfahringer, B.: Winning the KDD99 Classification Cup (1999), http:\/\/www.ai.univie.ac.at\/~bernhard\/kddcup99.html","DOI":"10.1145\/846183.846200"},{"key":"67_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V. Vapnik","year":"1995","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks \u2013 ISNN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427469_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T02:57:49Z","timestamp":1740538669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427469_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259145","9783540320692"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11427469_67","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}