{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:57:04Z","timestamp":1725544624767},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540331438"},{"type":"electronic","value":"9783540331445"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11729976_1","type":"book-chapter","created":{"date-parts":[[2006,2,28]],"date-time":"2006-02-28T06:47:42Z","timestamp":1141109262000},"page":"1-12","source":"Crossref","is-referenced-by-count":7,"title":["802.11 De-authentication Attack Detection Using Genetic Programming"],"prefix":"10.1007","author":[{"given":"Patrick","family":"LaRoche","sequence":"first","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Lundin, E., Jonsson, E.: Survey of intrusion detection research (2002)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Sung, A.: A comparative study of techniques for intrusion detection. In: 15th IEEE International Conference on Tools with Artificial Intelligence \u2013 ICTAI, pp. 570\u2013577 (2003)","DOI":"10.1109\/TAI.2003.1250243"},{"key":"1_CR3","unstructured":"Xia, T., Qu, G., Hariri, S., Yousif, M.: An efficient network intrusion detection method based on information theory and genetic algorithm. In: Performance, Computing, and Communications Conference, 2005. IPCCC 2005, pp. 11\u201317 (2005)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Sinclair, C., Pierce, L., Matzner, S.: An application of machine learning to network intrusion detection. In: Computer Security Applications Conference, ACSAC 1999, pp. 371\u2013377 (1999)","DOI":"10.1109\/CSAC.1999.816048"},{"key":"1_CR5","unstructured":"Gong, R.H., Zulkernine, M., Abolmaesumi, P.: A software implementation of a genetic algorithm based approach to network intrusion detection. In: Sixth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing - SNPD\/SAWN 2005, pp. 246\u2013253 (2005)"},{"key":"1_CR6","unstructured":"Li, W.: Using genetic algorithm for network intrusion detection, Kansas City, Kansas. In: United States Department of Energy Cyber Security Group 2004 Training Conference (2004)"},{"issue":"3","key":"1_CR7","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TEVC.2004.841683","volume":"9","author":"D. Song","year":"2005","unstructured":"Song, D., Heywood, M.I., Zincir-Heywood, A.N.: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Transactions on Evolutionary Computation\u00a09(3), 225\u2013239 (2005)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1109\/CEC.2003.1299940","volume-title":"Proceedings of the 2003 Congress on Evolutionary Computation CEC 2003","author":"W. Lu","year":"2003","unstructured":"Lu, W., Traore, I.: Detecting new forms of network intrusion using genetic programming. In: Sarker, R., Reynolds, R., Abbass, H., Tan, K.C., McKay, B., Essam, D., Gedeon, T. (eds.) Proceedings of the 2003 Congress on Evolutionary Computation CEC 2003, Canberra, pp. 2165\u20132172. IEEE Press, Los Alamitos (2003)"},{"key":"1_CR9","first-page":"1","volume-title":"Working Notes for the AAAI Symposium on Genetic Programming","author":"M. Crosbie","year":"1995","unstructured":"Crosbie, M., Spafford, E.H.: Applying genetic programming to intrusion detection. In: Siegel, E.V., Koza, J.R. (eds.) Working Notes for the AAAI Symposium on Genetic Programming, pp. 1\u20138. MIT, Cambridge (1995)"},{"key":"1_CR10","unstructured":"Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: USENIX Security Symposium, pp. 15\u201328 (2003)"},{"key":"1_CR11","unstructured":"IEEE-SA Standards Board: ANSI\/IEEE Std 802.11, 1999 Edition (R2003). IEEE, New York (1999)"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S. Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: The insecurity of 802.11 (2001), http:\/\/www.isaac.cs.berkeley.edu\/isaac\/wep-faq.html","DOI":"10.1145\/381677.381695"},{"key":"1_CR14","unstructured":"Kershaw, M.: Kismet (2005), http:\/\/www.kismetwireless.net\/"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Schmoyer, T., Lim, Y.X., Owen, H.: Wireless Intrusion Detection and Response: A case study using the classic man-in-the-middle attack. In: IEEE Wireless Communications and Networking Conference, Atlanta Ga (2004)","DOI":"10.1109\/WCNC.2004.1311303"},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/TSMCB.2002.999814","volume":"32","author":"M.I. Heywood","year":"2002","unstructured":"Heywood, M.I., Zincir-Heywood, A.N.: Dynamic page based crossover in linear genetic programming. IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics\u00a032(3), 380\u2013388 (2002)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Part B - Cybernetics"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-58484-6_275","volume-title":"Parallel Problem Solving from Nature - PPSN III","author":"C. Gathercole","year":"1994","unstructured":"Gathercole, C., Ross, P.: Dynamic training subset selection for supervised learning in genetic programming. In: Davidor, Y., M\u00e4nner, R., Schwefel, H.-P. (eds.) PPSN 1994. LNCS, vol.\u00a0866, pp. 312\u2013321. Springer, Heidelberg (1994)"}],"container-title":["Lecture Notes in Computer Science","Genetic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11729976_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:03Z","timestamp":1619506263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11729976_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540331438","9783540331445"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11729976_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}