{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:30:56Z","timestamp":1761597056534,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540406037"},{"type":"electronic","value":"9783540451105"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45110-2_125","type":"book-chapter","created":{"date-parts":[[2007,12,10]],"date-time":"2007-12-10T14:04:48Z","timestamp":1197295488000},"page":"2325-2336","source":"Crossref","is-referenced-by-count":28,"title":["A Linear Genetic Programming Approach to Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Dong","family":"Song","sequence":"first","affiliation":[]},{"given":"Malcolm I.","family":"Heywood","sequence":"additional","affiliation":[]},{"given":"A. Nur","family":"Zincir-Heywood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"125_CR1","doi-asserted-by":"crossref","unstructured":"Lippmann R.P., Fried D.J., Graf I., Haines J.W., Kendall K.R., McClung D., Weber D., Webster S.E., Wyschogrod D., Cunningham R.K., Zissman M.A.: Evaluating Intrusion Detection Systems: the 1998 DARPA Off-Line Intrusion Detection Evaluation. Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, 2 (2000)","DOI":"10.1109\/DISCEX.2000.821506"},{"issue":"4","key":"125_CR2","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security. 3(4), (2000) 262\u2013294","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"125_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C. Elkan","year":"2000","unstructured":"Elkan C.: Results of the KDD\u201999 Classifier Learning Contest. SIGKDD Explorations. ACM SIGKDD. 1(2), (2000) 63\u201364","journal-title":"SIGKDD Explorations. ACM SIGKDD"},{"key":"125_CR4","doi-asserted-by":"crossref","unstructured":"Wenke L., Stolfo S.J., Mok K.W.: A data mining framework for building intrusion detection models. Proceedings of the 1999 IEEE Symposium on Security and Privacy (1999) 120\u2013132","DOI":"10.1109\/SECPRI.1999.766909"},{"issue":"2","key":"125_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/846183.846200","volume":"1","author":"B. Pfahringer","year":"2000","unstructured":"Pfahringer B.: Winning the KDD99 Classification Cup: Bagged Boosting. SIGKDD Explorations. ACM SIGKDD. 1(2) (2000) 65\u201366","journal-title":"ACM SIGKDD"},{"issue":"2","key":"125_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/846183.846201","volume":"1","author":"I. Levin","year":"2000","unstructured":"Levin I.: KDD-99 Classifier Learning Contest LLSoft\u2019s Results Overview. SIGKDD Explorations. ACM SIGKDD. 1(2) (2000) 67\u201375","journal-title":"ACM SIGKDD"},{"issue":"2","key":"125_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/846183.846202","volume":"1","author":"M. Vladimir","year":"2000","unstructured":"Vladimir M., Alexei V., Ivan S.: The MP13 Approach to the KDD\u201999 Classifier Learning Contest. SIGKDD Explorations. ACM SIGKDD. 1(2) (2000) 76\u201377","journal-title":"ACM SIGKDD"},{"key":"125_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/3-540-58484-6_275","volume-title":"Parallel Problem Solving from Nature III","author":"C. Gathercole","year":"1994","unstructured":"Gathercole C., Ross P.: Dynamic Training Subset Selection for Supervised Learning in Genetic Programming. Parallel Problem Solving from Nature III. Lecture Notes in Computer Science, Vol. 866. Springer-Verlag, Berlin (1994) 312\u2013321"},{"key":"125_CR9","unstructured":"Cramer N.L.: A Representation for the Adaptive Generation of Simple Sequential Programs. Proceedings of the International Conference on Genetic Algorithms and Their Application (1985) 183\u2013187"},{"key":"125_CR10","first-page":"311","volume-title":"Advances in Genetic Programming","author":"P. Nordin","year":"1994","unstructured":"Nordin P.: A Compiling Genetic Programming System that Directly Manipulates the Machine Code. In: Kinnear K.E. (ed.): Advances in Genetic Programming, Chapter 14. MIT Press, Cambridge, MA (1994) 311\u2013334"},{"key":"125_CR11","unstructured":"Huelsbergen L.: Finding General Solutions to the Parity Problem by Evolving Machine-Language Representations. Proceedings of the 3rd Conference on Genetic Programming. Morgan Kaufmann, San Francisco, CA (1998) 158\u2013166"},{"issue":"3","key":"125_CR12","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/TSMCB.2002.999814","volume":"32","author":"M.I. Heywood","year":"2002","unstructured":"Heywood M.I., Zincir-Heywood A.N.: Dynamic Page-Based Linear Genetic Programming. IEEE Transactions on Systems, Man and Cybernetics \u2014 PartB: Cybernetics. 32(3) (2002), 380\u2013388","journal-title":"IEEE Transactions on Systems, Man and Cybernetics \u2014 PartB: Cybernetics"},{"key":"125_CR13","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"J.R. Koza","year":"1992","unstructured":"Koza J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge, MA (1992)"},{"key":"125_CR14","volume-title":"Computer Architecture: A Quantitative Approach","author":"J.L. Hennessy","year":"2002","unstructured":"Hennessy J.L., Patterson D.A.: Computer Architecture: A Quantitative Approach. 3rd Edition. Morgan Kaufmann, San Francisco, CA (2002)","edition":"3rd Edition"},{"issue":"1","key":"125_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/4235.910462","volume":"5","author":"M. Brameier","year":"2001","unstructured":"Brameier M., Banzhaf W.: A Comparison of Linear Genetic Programming and Neural Networks in Medical Data Mining. IEEE Transactions on Evolutionary Computation, 5(1) (2001) 17\u201326","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"125_CR16","doi-asserted-by":"crossref","unstructured":"Caberera J.B.D., Ravichandran B., Mehra R.K.: Statistical traffic modeling for network intrusion detection. Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (2000) 466\u2013473","DOI":"10.1109\/MASCOT.2000.876573"},{"key":"125_CR17","unstructured":"Kendall K.: A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems. Master Thesis. Massachusetts Institute of Technology (1998)"}],"container-title":["Lecture Notes in Computer Science","Genetic and Evolutionary Computation \u2014 GECCO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45110-2_125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T13:55:51Z","timestamp":1737640551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45110-2_125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406037","9783540451105"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45110-2_125","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}