{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:28:30Z","timestamp":1725481710370},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540676027"},{"type":"electronic","value":"9783540451648"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45164-1_33","type":"book-chapter","created":{"date-parts":[[2007,3,5]],"date-time":"2007-03-05T11:42:19Z","timestamp":1173094939000},"page":"313-322","source":"Crossref","is-referenced-by-count":4,"title":["Mining TCP\/IP Traffic for Network Intrusion Detection by Using a Distributed Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Filippo","family":"Neri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,1,14]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"W. Cohen. Fast effective rule induction. In Proceedings of International Machine Learning Conference 1995, Lake Tahoe, CA, 1995. Morgan Kaufmann. 314, 315","key":"33_CR1","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"issue":"2","key":"33_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D. Denning","year":"1987","unstructured":"D. Denning. An intrusion detection model. IEEE Transaction on Software Engineering, SE-13(2):222\u2013232, 1987. 313","journal-title":"IEEE Transaction on Software Engineering"},{"doi-asserted-by":"crossref","unstructured":"S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 1996. 313","key":"33_CR3","DOI":"10.1109\/SECPRI.1996.502675"},{"unstructured":"A. Ghosh, A. Schwartzbard, and M. Schatz. Learning program behavior profiles for intrusion detection. In USENIX Workshop on Intrusion Detection and Network Monitoring. USENIX Association, 1999. 313","key":"33_CR4"},{"issue":"4","key":"33_CR5","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1162\/evco.1995.3.4.375","volume":"3","author":"A. Giordana","year":"1995","unstructured":"A. Giordana and F. Neri. Search-intensive concept induction. Evolutionary Computation, 3(4):375\u2013416, 1995. 314, 315","journal-title":"Evolutionary Computation"},{"unstructured":"D. Goldberg. Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading, Ma, 1989. 315","key":"33_CR6"},{"key":"33_CR7","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S. A. Hofmeyr","year":"1998","unstructured":"S. A. Hofmeyr, A. Somayaji, and S. Forrest. Intrusion detection using sequences of system calls. Journal of Computer Security, 6:151\u2013180, 1998. 313","journal-title":"Journal of Computer Security"},{"unstructured":"S. Kumar and E. Spafford. A pattern matching model for misuse detection. In National Computer Security Conference, pages 11\u201321, Baltimore, 1994. 313","key":"33_CR8"},{"unstructured":"T. Lane and C. Brodley. An application of machine learning to anomaly detection. In National Information Systems Security Conference, Baltimore, 1997. 313","key":"33_CR9"},{"unstructured":"T. Lane and C. Brodley. Approaches to online learning and conceptual drift for user identification in computer security. Technical report, ECE and the COAST Laboratory, Purdue University, Coast TR 98-12, 1998. 314","key":"33_CR10"},{"doi-asserted-by":"crossref","unstructured":"W. Lee, S. Stolfo, and K. Mok. Mining in a data-flow environment: experience in network intrusion detection. In Knowledge Discovery and Data Mining KDD\u201999, pages 114\u2013124. ACM Press, 1999. 313, 314, 316, 317, 319","key":"33_CR11","DOI":"10.1145\/312129.312212"},{"unstructured":"R. Lippmann, R. Cunningham, D. Fried, I. Graf, K. Kendall, S. Webster, and M. Zissmann. Results of the DARPA 1998 offline intrusion detection evaluation. In Recent Advances in Intrusion Detection 99, RAID\u201999, W. Lafayette, IN, 1999. Purdue University. 317","key":"33_CR12"},{"key":"33_CR13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-662-12405-5","volume-title":"Machine Learning","author":"Ryszard S. Michalski","year":"1983","unstructured":"R.S. Michalski. A theory and methodology of inductive learning. In R. Michalski, J. Carbonell, and T. Mitchell, editors, Machine Learning, an Artificial Intelligence Approach, volume I, pages 83\u2013134. Morgan Kaufmann, Los Altos, CA, 1983. 314"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/34.544085","volume":"PAMI-18","author":"F. Neri","year":"1996","unstructured":"F. Neri and L. Saitta. Exploring the power of genetic search in learning symbolic classifiers. IEEE Trans. on Pattern Analysis and Machine Intelligence, PAMI-18:1135\u20131142, 1996. 314","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"unstructured":"M. A. Potter, K. A. De Jong, and J. J. Grefenstette. A coevolutionary approach to learning sequential decision rules. In Sixth International Conference on Genetic Algorithms, pages 366\u2013372, Pittsburgh, PA, 1995. Morgan Kaufmann. 315","key":"33_CR15"},{"key":"33_CR16","volume-title":"C4.5: Programs for Machine Learning","author":"J. R. Quinlan","year":"1993","unstructured":"J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann, California, 1993. 315"}],"container-title":["Lecture Notes in Computer Science","Machine Learning: ECML 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45164-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T01:48:29Z","timestamp":1556156909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45164-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540676027","9783540451648"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45164-1_33","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}