{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:14:48Z","timestamp":1725495288577},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673538"},{"type":"electronic","value":"9783540455615"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45561-2_21","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T12:49:28Z","timestamp":1195217368000},"page":"214-223","source":"Crossref","is-referenced-by-count":0,"title":["Evolutive Modeling of TCP\/IP Network Traffic for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Filippo","family":"Neri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,11]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Cohen, W. (1995). Fast effective rule induction. In Proceedings of International Machine Learning Conference 1995, Lake Tahoe, CA. Morgan Kaufmann.","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"issue":"2","key":"21_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D. Denning","year":"1987","unstructured":"Denning, D. (1987). An intrusion detection model. IEEE Transaction on Software Engineering, SE-13(2):222\u2013232.","journal-title":"IEEE Transaction on Software Engineering"},{"key":"21_CR3","unstructured":"Ghosh, A., Schwartzbard, A., and Schatz, M. (1999). Learning program behavior profiles for intrusion detection. In USENIX Workshop on Intrusion Detection and Network Monitoring. USENIX Association."},{"issue":"4","key":"21_CR4","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1162\/evco.1995.3.4.375","volume":"3","author":"A. Giordana","year":"1995","unstructured":"Giordana, A. and Neri, F. (1995). Search-intensive concept induction. Evolutionary Computation, 3(4):375\u2013416.","journal-title":"Evolutionary Computation"},{"key":"21_CR5","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"D. Goldberg","year":"1989","unstructured":"Goldberg, D. (1989). Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading, Ma."},{"key":"21_CR6","unstructured":"Kumar, S. and Spafford, E. (1994). A pattern matching model for misuse detection. In National Computer Security Conference, pages 11\u201321, Baltimore."},{"key":"21_CR7","unstructured":"Lane, T. and Brodley, C. (1997). An application of machine learning to anomaly detection. In National Information Systems Security Conference, Baltimore."},{"key":"21_CR8","unstructured":"Lane, T. and Brodley, C. (1998). Approaches to online learning and conceptual drift for user identification in computer security. Technical report, ECE and the COAST Laboratory, Purdue University, Coast TR 98-12."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Lee, W., Stolfo, S., and Mok, K. (1999). Mining in a data-flow environment: experience in network intrusion detection. In Knowledge Discovery and Data Mining KDD\u201999, pages 114\u2013124. ACM Press.","DOI":"10.1145\/312129.312212"},{"key":"21_CR10","unstructured":"Lippmann, R., Cunningham, R., Fried, D., Graf, I., Kendall, K., Webster, S., and Zissmann, M. (1999). Results of the DARPA 1998 offline intrusion detection evaluation. In Recent Advances in Intrusion Detection 99, RAID\u201999, W. Lafayette, IN. Purdue University."},{"key":"21_CR11","first-page":"83","volume-title":"Machine Learning, an Artificial Intelligence Approach","author":"R. Michalski","year":"1983","unstructured":"Michalski, R. (1983). A theory and methodology of inductive learning. In Michalski, R., Carbonell, J., and Mitchell, T., editors, Machine Learning, an Artificial Intelligence Approach, volume I, pages 83\u2013134. Morgan Kaufmann, Los Altos, CA."},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/34.544085","volume":"PAMI-18","author":"F. Neri","year":"1996","unstructured":"Neri, F. and Saitta, L. (1996). Exploring the power of genetic search in learning symbolic classifiers. IEEE Trans. on Pattern Analysis and Machine Intelligence, PAMI-18:1135\u20131142.","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"21_CR13","unstructured":"Quinlan, J. R. (1993). C4.5: Programs for Machine Learning. Morgan Kaufmann, California."}],"container-title":["Lecture Notes in Computer Science","Real-World Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45561-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T11:49:34Z","timestamp":1551095374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45561-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673538","9783540455615"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45561-2_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}