{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:52:26Z","timestamp":1725472346679},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540490265"},{"type":"electronic","value":"9783540490586"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11925231_60","type":"book-chapter","created":{"date-parts":[[2006,11,6]],"date-time":"2006-11-06T14:48:34Z","timestamp":1162824514000},"page":"632-640","source":"Crossref","is-referenced-by-count":1,"title":["Toward Lightweight Detection and Visualization for Denial of Service Attacks"],"prefix":"10.1007","author":[{"given":"Dong Seong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sang Min","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jong Sou","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","volume-title":"Classification and Regression Trees","author":"L. Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Chapman and Hall, New York (1984)"},{"issue":"1","key":"60_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forest. Machine Learning\u00a045(1), 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"60_CR3","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley & Sons, Chichester (2001)","edition":"2"},{"key":"60_CR4","volume-title":"Theory and Applications of Multidimensional Scaling","author":"F.W. Young","year":"1994","unstructured":"Young, F.W., Hamer, R.M.: Theory and Applications of Multidimensional Scaling. Eribaum Associates, Hillsdale (1994)"},{"key":"60_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/11427469_67","volume-title":"Advances in Neural Networks \u2013 ISNN 2005","author":"D. Kim","year":"2005","unstructured":"Kim, D., Nguyen, H.-N., Ohn, S.-Y., Park, J.: Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol.\u00a03498, pp. 415\u2013420. Springer, Heidelberg (2005)"},{"key":"60_CR6","unstructured":"KDD Cup 1999 Data: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"60_CR7","unstructured":"KDD-Cup-99 Task Description: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/task.html"},{"key":"60_CR8","unstructured":"Dash, M., Choi, K., Scheuermann, P., Liu, H.: Feature Selection for Clustering \u2013 A Filter Soultion"},{"key":"60_CR9","unstructured":"Hall, M.A.: Feature Subset Selection: A correlation Based Filter Approach"},{"key":"60_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/S0925-2312(03)00431-4","volume":"55","author":"D. Meyer","year":"2003","unstructured":"Meyer, D., Leisch, F., Hornik, K.: The Support Vector Machine under Test. Neurocomputing\u00a055, 169\u2013186 (2003)","journal-title":"Neurocomputing"},{"key":"60_CR11","unstructured":"Noelia, S.-M.: A New Wrapper Method for Feature Subset Selection"},{"key":"60_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/11599548_24","volume-title":"Information Security and Cryptology","author":"J. Park","year":"2005","unstructured":"Park, J., Shazzad, K.M., Kim, D.: Toward Modeling Lightweight Intrusion Detection System through Correlation-Based Hybrid Feature Selection. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol.\u00a03822, pp. 279\u2013289. Springer, Heidelberg (2005)"},{"issue":"1\u20132","key":"60_CR13","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0004-3702(97)00043-X","volume":"97","author":"R. Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artificial Intelligence\u00a097(1\u20132), 273\u2013324 (1997)","journal-title":"Artificial Intelligence"},{"key":"60_CR14","doi-asserted-by":"crossref","unstructured":"Sabhnani, M., Serpen, G.: On Failure of Machine Learning Algorithms for Detecting Misuse in KDD Intrusion Detection Data Set. Intelligent Analysis (2004)","DOI":"10.3233\/IDA-2004-8406"},{"key":"60_CR15","unstructured":"SNORT, http:\/\/www.snort.org"},{"key":"60_CR16","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1109\/SAINT.2003.1183050","volume-title":"Proc. of the 2003 Int. Symposium on Applications and the Internet Technology","author":"A.H. Sung","year":"2003","unstructured":"Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: Proc. of the 2003 Int. Symposium on Applications and the Internet Technology, pp. 209\u2013216. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"60_CR17","unstructured":"The R Project for Statistical Computing, http:\/\/www.r-project.org\/"}],"container-title":["Lecture Notes in Computer Science","MICAI 2006: Advances in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11925231_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:45:46Z","timestamp":1619509546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11925231_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540490265","9783540490586"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11925231_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}