{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:41:00Z","timestamp":1726004460127},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030028367"},{"type":"electronic","value":"9783030028374"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02837-4_25","type":"book-chapter","created":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T05:21:45Z","timestamp":1546233705000},"page":"302-312","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Use of Artificial Intelligence for the Intrusion Detection System in Computer Networks"],"prefix":"10.1007","author":[{"given":"Santiago Yip","family":"Ortu\u00f1o","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 Alberto","family":"Hern\u00e1ndez Aguilar","sequence":"additional","affiliation":[]},{"given":"Blanca","family":"Taboada","sequence":"additional","affiliation":[]},{"given":"Carlos Alberto","family":"Ochoa Ortiz","sequence":"additional","affiliation":[]},{"given":"Miguel P\u00e9rez","family":"Ram\u00edrez","sequence":"additional","affiliation":[]},{"given":"Gustavo","family":"Arroyo Figueroa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,1]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Al-Enezi, J.R., Abbod, M.F., Alsharhan, S.: Artificial Immune Systems - Models, Algorithms and Applications. Academic Research Publishing Agency (2010)","DOI":"10.1109\/IEEEGCC.2009.5734320"},{"key":"25_CR2","unstructured":"Bachmayer, S.: Artificial Immune Systems. Department of Computer Science, University of Helsinki (2008)"},{"key":"25_CR3","first-page":"123","volume":"1","author":"D Dasgupta","year":"2003","unstructured":"Dasgupta, D., Ji, Z., Gonz\u00e1lez, F.: Artificial immune system (AIS) research in the last five years. IEEE Congr. Evol. Comput. 1, 123\u2013130 (2003)","journal-title":"IEEE Congr. Evol. Comput."},{"key":"25_CR4","unstructured":"Dario Duke, N., Chavarro Porras, J.C., Moreno Laverde, R.: Smart security. Scientia Et Technica 1(35) (2007)"},{"key":"25_CR5","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"LN Castro","year":"2002","unstructured":"Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, London (2002)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Farmer, J.D., Packard, N.H., Perelson, A.S.: The immune system, adaptation, and machine learning. Elsevier Science Publishers B.V., pp. 197\u2013204 (1986)","DOI":"10.1016\/0167-2789(86)90240-X"},{"key":"25_CR7","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, Amsterdam (2011)"},{"key":"25_CR8","unstructured":"ISO: The portal of ISO 27001 in Spanish. What is an ISMS? (2012). http:\/\/www.iso27000.es\/sgsi.html"},{"key":"25_CR9","doi-asserted-by":"crossref","DOI":"10.1201\/9780429292859","volume-title":"Data Mining with R: Learning with Case Studies","author":"L Torgo","year":"2011","unstructured":"Torgo, L., Torgo, L.: Data Mining with R: Learning with Case Studies. Chapman & Hall\/CRC, Boca Raton (2011)"},{"key":"25_CR10","unstructured":"Zum Herrenhaus, M., Schommer, C.: Security analysis in internet traffic through artificial immune systems. In: INTERREG IIIC\/e-Bird, Workshop \u201cTrustworthy Software\u201d, pp. 1\u20139 (2006)"},{"key":"25_CR11","unstructured":"Zum Herrenhaus, M., Schommer, C.: Healthy-security analysis in Internet traffic through artificial immune systems. arXiv preprint arXiv:0805.0909 (2008)"},{"key":"25_CR12","unstructured":"Symantec: El gusano Stuxnet. (2010). http:\/\/www.symantec.com\/es\/mx\/page.jsp?id=stuxnet"},{"key":"25_CR13","unstructured":"Neal, D.: Home Depot confirms 53 million email addresses stolen in recent hack, 7 November 2014. http:\/\/www.v3.co.uk\/v3-uk\/news\/2380100\/home-depot-confirms-53-million-email-addresses-stolen-in-recent-hack"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Kaspersky Security Network Report: Ransomware in 2014\u20132016 (2016)","DOI":"10.1016\/S1353-4858(16)30102-7"},{"key":"25_CR15","volume-title":"Principles of Information Security","author":"ME Whitman","year":"2011","unstructured":"Whitman, M.E., Herbert, M.J.: Principles of Information Security. Cengage Learning, Boston (2011)"},{"key":"25_CR16","unstructured":"Kim, J., Bentley, P.J.: An evaluation of negative selection in an artificial immune system. In: Proceedings of GECCO, pp. 1330\u20131337 (2001)"},{"issue":"4","key":"25_CR17","first-page":"463","volume":"13","author":"JA Hern\u00e1ndez Aguilar","year":"2010","unstructured":"Hern\u00e1ndez Aguilar, J.A., Burlak, G., Lara, B.: Dise\u00f1o e Implementaci\u00f3n de un Sistema de Evaluaci\u00f3n Remota con Seguridad Avanzada para Universidades Utilizando Miner\u00eda de Datos. Comput. y Sist. 13(4), 463\u2013473 (2010)","journal-title":"Comput. y Sist."},{"key":"25_CR18","unstructured":"KDD Cup: Dataset, 72 (1999). http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"25_CR19","unstructured":"Weka (2017). https:\/\/sourceforge.net\/projects\/weka\/files\/weka-3-6\/3.6.4\/"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Yan, Q., Yu, J.: AINIDS: an immune-based network intrusion detection system. In: International Society for Optics and Photonics Defense and Security Symposium, p. 62410U, April 2006","DOI":"10.1117\/12.664752"},{"issue":"2","key":"25_CR21","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.pnsc.2008.06.008","volume":"19","author":"Z Jinquan","year":"2009","unstructured":"Jinquan, Z., Xiaojie, L., Tao, L., Caiming, L., Lingxi, P., Feixian, S.: A self-adaptive negative selection algorithm used for anomaly detection. Prog. Nat. Sci. 19(2), 261\u2013266 (2009)","journal-title":"Prog. Nat. Sci."},{"issue":"2","key":"25_CR22","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/846183.846201","volume":"1","author":"I Levin","year":"2000","unstructured":"Levin, I.: KDD-99 classifier learning contest: LLSoft\u2019s results overview. SIGKDD Explor. 1(2), 67\u201375 (2000)","journal-title":"SIGKDD Explor."},{"key":"25_CR23","first-page":"87","volume":"51","author":"I Rojas Gonzalez","year":"2010","unstructured":"Rojas Gonzalez, I., Garc\u00eda Gallardo, J.: Bayesian network application on information security. Res. Comput. Sci. 51, 87\u201398 (2010). (I.P. Nacional, Ed.)","journal-title":"Res. Comput. Sci."},{"issue":"1","key":"25_CR24","first-page":"89","volume":"12","author":"JCL Pimentel","year":"2008","unstructured":"Pimentel, J.C.L., Monroy, R.: Formal support to security protocol development: a survey. Comput. y Sist. 12(1), 89\u2013108 (2008)","journal-title":"Comput. y Sist."},{"issue":"4","key":"25_CR25","first-page":"827","volume":"20","author":"MDC Arg\u00fcelles Arellano","year":"2016","unstructured":"Arg\u00fcelles Arellano, M.D.C.: Challenges of Cyber Law in Mexico. Comput. y Sist. 20(4), 827\u2013831 (2016)","journal-title":"Comput. y Sist."},{"key":"25_CR26","volume-title":"Data mining, Introductory and Advanced Topics","author":"MH Danham","year":"2006","unstructured":"Danham, M.H., Sridhar, S.: Data mining, Introductory and Advanced Topics, 1st edn. Person education, London (2006)","edition":"1"},{"issue":"2","key":"25_CR27","first-page":"256","volume":"6","author":"TR Patil","year":"2013","unstructured":"Patil, T.R., Sherekar, S.S.: Performance analysis of Naive Bayes and J48 classification algorithm for data classification. Int. J. Comput. Sci. Appl. 6(2), 256\u2013261 (2013)","journal-title":"Int. J. Comput. Sci. Appl."},{"key":"25_CR28","unstructured":"Kyoto: Kyoto data (1999). http:\/\/www.takakura.com\/kyoto_data\/"},{"key":"25_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/11536444_2","volume-title":"Artificial Immune Systems, ICARIS 2005","author":"V Cutello","year":"2005","unstructured":"Cutello, V., Narzisi, G., Nicosia, G., Pavone, M.: Clonal selection algorithms: a comparative study using effective mutation potentials. In: Jacob, C., Pilat, M.L., Bentley, P.J., Timmis, J.I. (eds.) Artificial Immune Systems, ICARIS 2005. LNCS, vol. 3627, pp. 13\u201328. Springer, Berlin (2005). https:\/\/doi.org\/10.1007\/11536444_2"},{"key":"25_CR30","unstructured":"AISWEB: The Online Home of Artificial Immune Systems (2017). http:\/\/www.artificial-immune-systems.org\/algorithms.shtml#clonal-alg"},{"key":"25_CR31","unstructured":"Data Mining with R: J48 decision tree (2017). http:\/\/data-mining.business-intelligence.uoc.edu\/home\/j48-decision-tree"}],"container-title":["Lecture Notes in Computer Science","Advances in Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02837-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T08:45:52Z","timestamp":1573634752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02837-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030028367","9783030028374"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02837-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"MICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexican International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Enseneda","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexico","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"micai2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.micai.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}