{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T12:27:24Z","timestamp":1744892844089},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030028367"},{"type":"electronic","value":"9783030028374"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02837-4_5","type":"book-chapter","created":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T05:21:45Z","timestamp":1546233705000},"page":"54-66","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Introducing a Classification Model Based on SVM for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Ghodratolah","family":"Dastfal","sequence":"first","affiliation":[]},{"given":"Samad","family":"Nejatian","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Parvin","sequence":"additional","affiliation":[]},{"given":"Vahideh","family":"Rezaie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,1]]},"reference":[{"key":"5_CR1","volume-title":"Intrusion Detection & Prevention","author":"C Endorf","year":"2004","unstructured":"Endorf, C., Eugene, S., Mellander, J.: Intrusion Detection & Prevention. McGraw-Hill, New York (2004)"},{"key":"5_CR2","first-page":"50","volume":"6694","author":"I Santos","year":"2011","unstructured":"Santos, I., Sanz, B., Laorden, C., Brezo, F., Bringas, P.G.: Opcode-sequence-based semi-supervised unknown malware detection. Comput. Intell. Secur. Inf. Syst. 6694, 50\u201357 (2011)","journal-title":"Comput. Intell. Secur. Inf. Syst."},{"issue":"1","key":"5_CR3","first-page":"53","volume":"31","author":"H Alishvandi","year":"2016","unstructured":"Alishvandi, H., Gouraki, G.H., Parvin, H.: An enhanced dynamic detection of possible invariants based on best permutation of test cases. Comput. Syst. Sci. Eng. 31(1), 53\u201361 (2016)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"6","key":"5_CR4","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1166\/jbns.2013.1162","volume":"7","author":"H Parvin","year":"2013","unstructured":"Parvin, H., Minaei-Bidgoli, B., Alinejad-Rokny, H.: A new imbalanced learning and dictions tree method for breast cancer diagnosis. J. Bionanosci. 7(6), 673\u2013678 (2013)","journal-title":"J. Bionanosci."},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1080\/0952813X.2012.715683","volume":"25","author":"H Parvin","year":"2013","unstructured":"Parvin, H., Alinejad-Rokny, H., Minaei-Bidgoli, B., Parvin, S.: A new classifier ensemble methodology based on subspace learning. J. Exp. Theor. Artif. Intell. 25(2), 227\u2013250 (2013)","journal-title":"J. Exp. Theor. Artif. Intell."},{"issue":"5","key":"5_CR6","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1016\/j.compeleceng.2013.02.004","volume":"39","author":"H Parvin","year":"2013","unstructured":"Parvin, H., Minaei-Bidgoli, B., Alinejad-Rokny, H., Punch, W.F.: Data weighing mechanisms for clustering ensembles. Comput. Electr. Eng. 39(5), 1433\u20131450 (2013)","journal-title":"Comput. Electr. Eng."},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.4156\/jdcta.vol3.issue2.parvin","volume":"3","author":"H Parvin","year":"2009","unstructured":"Parvin, H., Alizadeh, H., Minaei-Bidgoli, B.: A New method for constructing classifier ensembles. JDCTA 3(2), 62\u201366 (2009)","journal-title":"JDCTA"},{"issue":"9","key":"5_CR8","first-page":"33","volume":"7","author":"H Parvin","year":"2011","unstructured":"Parvin, H., Alinejad-Rokny, H., Asadi, M.: An ensemble based approach for feature selection. J. Appl. Sci. Res. 7(9), 33\u201343 (2011)","journal-title":"J. Appl. Sci. Res."},{"doi-asserted-by":"crossref","unstructured":"Parvin, H., Alizadeh, H., Minaei-Bidgoli, B., Analoui, M.: CCHR: combination of classifiers using heuristic retraining. In: International Conference on Networked Computing and Advanced Information Management (NCM 2008) (2008)","key":"5_CR9","DOI":"10.1109\/NCM.2008.228"},{"unstructured":"Parvin, H., Alizadeh, H., Fathy, M., Minaei-Bidgoli, B.: Improved face detection using spatial histogram features. In: IPCV 2008, pp. 381\u2013386 (2008)","key":"5_CR10"},{"issue":"2","key":"5_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.12785\/ijlms\/010204","volume":"1","author":"H Parvin","year":"2013","unstructured":"Parvin, H., Alinejad-Rokny, H., Parvin, S.: A classifier ensemble of binary classifier ensembles. Int. J. Learn. Manag. Syst. 1(2), 37\u201347 (2013)","journal-title":"Int. J. Learn. Manag. Syst."},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11634-013-0130-x","volume":"7","author":"H Parvin","year":"2013","unstructured":"Parvin, H., Minaei-Bidgoli, B.: A clustering ensemble framework based on elite selection of weighted clusters. Adv. Data Anal. Classif. 7(2), 181\u2013208 (2013)","journal-title":"Adv. Data Anal. Classif."},{"issue":"2","key":"5_CR13","first-page":"1350005","volume":"27","author":"H Alizadeh","year":"2013","unstructured":"Alizadeh, H., Minaei-Bidgoli, B., Parvin, H.: Optimizing fuzzy cluster ensemble in string representation. IJPRAI 27(2), 1350005 (2013)","journal-title":"IJPRAI"},{"issue":"2","key":"5_CR14","first-page":"286","volume":"11","author":"H Parvin","year":"2012","unstructured":"Parvin, H., Beigi, A., Mozayani, N.: A clustering ensemble learning method based on the ant colony clustering algorithm. Int. J. Appl. Comput. Math. 11(2), 286\u2013302 (2012)","journal-title":"Int. J. Appl. Comput. Math."},{"issue":"1","key":"5_CR15","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/0952813X.2013.813974","volume":"26","author":"H Alizadeh","year":"2014","unstructured":"Alizadeh, H., Minaei-Bidgoli, B., Parvin, H.: To improve the quality of cluster ensembles by selecting a subset of base clusters. J. Exp. Theor. Artif. Intell. 26(1), 127\u2013150 (2014)","journal-title":"J. Exp. Theor. Artif. Intell."},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"389","DOI":"10.3233\/IDA-140647","volume":"18","author":"H Alizadeh","year":"2014","unstructured":"Alizadeh, H., Minaei-Bidgoli, B., Parvin, H.: Cluster ensemble selection based on a new cluster stability measure. Intell. Data Anal. 18(3), 389\u2013408 (2014)","journal-title":"Intell. Data Anal."},{"issue":"1","key":"5_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10462-011-9295-x","volume":"41","author":"B Minaei-Bidgoli","year":"2014","unstructured":"Minaei-Bidgoli, B., Parvin, H., Alinejad-Rokny, H., Alizadeh, H., Punch, W.F.: Effects of resampling method and adaptation on clustering ensemble efficacy. Artif. Intell. Rev. 41(1), 27\u201348 (2014)","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10044-013-0364-4","volume":"18","author":"H Parvin","year":"2015","unstructured":"Parvin, H., Minaei-Bidgoli, B.: A clustering ensemble framework based on selection of fuzzy weighted clusters in a locally adaptive clustering algorithm. Pattern Anal. Appl. 18(1), 87\u2013112 (2015)","journal-title":"Pattern Anal. Appl."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.engappai.2014.08.005","volume":"37","author":"H Parvin","year":"2015","unstructured":"Parvin, H., Mirnabibaboli, M., Alinejad-Rokny, H.: Proposing a classifier ensemble framework based on classifier selection and decision tree. Eng. Appl. Artif. Intell. 37, 34\u201342 (2015)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"247","DOI":"10.4156\/jdcta.vol6.issue1.30","volume":"6","author":"H Parvin","year":"2012","unstructured":"Parvin, H., Mohammadi, M., Rezaei, Z.: Face identification based on Gabor-wavelet features. Int. J. Digit. Content Technol. Appl. 6(1), 247\u2013255 (2012)","journal-title":"Int. J. Digit. Content Technol. Appl."},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhutan","year":"2014","unstructured":"Bhutan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR22","first-page":"669","volume":"5","author":"UV Luxburg","year":"2004","unstructured":"Luxburg, U.V., Bousquet, O.: Distance-based classification with Lipschitz functions. J. Mach. Learn. Res. 5, 669\u2013695 (2004)","journal-title":"J. Mach. Learn. Res."},{"key":"5_CR23","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector network. Mach. Learn. 20, 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TIFS.2013.2290197","volume":"9","author":"J Zhang","year":"2014","unstructured":"Zhang, J., Perdisci, R., Lee, W., Luo, X., Sarfraz, U.: Building a scalable system for stealthy P2P-botnet detection. IEEE Trans. Inf. Forensics Secur. 9(1), 27\u201338 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"unstructured":"KDD Cup (1999), October 2007. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html","key":"5_CR25"},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.asoc.2014.01.028","volume":"18","author":"F Kuang","year":"2014","unstructured":"Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18, 178\u2013184 (2014)","journal-title":"Appl. Soft Comput."},{"unstructured":"NSL-KDD data set for network-based intrusion detection systems, March 2009. http:\/\/nsl.cs.unb.ca\/NSL-KDD\/","key":"5_CR27"},{"doi-asserted-by":"crossref","unstructured":"Keshavarz, A., Ghassemian, H., Dehghani, H.: Hierarchical classification of hyperspectral images by using SVMs and neighborhood class property. In: IEEE IGARSS2005, pp. 3219\u20133222 (2005)","key":"5_CR28","DOI":"10.1109\/IGARSS.2005.1526526"},{"key":"5_CR29","first-page":"45","volume":"16","author":"M Woniakeyot","year":"2014","unstructured":"Woniakeyot, M., Gra\u00f1a, M., Corchado, E.: A survey of multiple classifier systems as hybrid systems. Inf. Fusion 16, 45\u201390 (2014)","journal-title":"Inf. Fusion"},{"doi-asserted-by":"crossref","unstructured":"Bijani, S., Robertson, D.: A review of attacks and security approaches in open multi-agent systems. Artif. Intell. Rev. 1\u201330 (2012)","key":"5_CR30","DOI":"10.1007\/s10462-012-9343-1"},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24, 295\u2013307 (2005)","journal-title":"Comput. Secur."},{"issue":"5","key":"5_CR32","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough sets. Int. J. Comput. Inf. Sci. 11(5), 341\u2013356 (1982)","journal-title":"Int. J. Comput. Inf. Sci."},{"key":"5_CR33","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1109\/TST.2013.6574675","volume":"18","author":"J Zhou","year":"2013","unstructured":"Zhou, J., Hu, L., Wang, F., Lu, H., Zhao, K.: An efficient multidimensional fusion algorithm for IOT data based on partitioning. Tsinghua Sci. Technol. 18, 369\u2013378 (2013)","journal-title":"Tsinghua Sci. Technol."},{"issue":"9","key":"5_CR34","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1631\/jzus.2004.1076","volume":"5","author":"L Zhang","year":"2004","unstructured":"Zhang, L., Zhang, G., Yu, L., Bai, Y.: Intrusion detection using rough set classification. J. Zhejiang Univ. Sci. 5(9), 1076\u20131086 (2004)","journal-title":"J. Zhejiang Univ. Sci."},{"doi-asserted-by":"crossref","unstructured":"Chen, R.C., Cheng, K., Hsieh, C.F.: Using rough set and support vector machine for network intrusion detection system. In: Proceedings of the 1st Asian Conference on Intelligent Information and Database Systems, Washington, DC, USA (2009)","key":"5_CR35","DOI":"10.1109\/ACIIDS.2009.59"},{"doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceeding of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Application (CISDA) (2009)","key":"5_CR36","DOI":"10.1109\/CISDA.2009.5356528"},{"unstructured":"Stolfo, S.J., Fan, W., Prodromidis, A., Chan, P.K., Lee, W.: Cost-sensitive modeling for fraud and intrusion detection: results from the JAM project. In Proceedings of the 2000 DARPA information survivability conference and exposition (2000)","key":"5_CR37"},{"key":"5_CR38","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 34, 579\u2013595 (2000)","journal-title":"Comput. Netw."}],"container-title":["Lecture Notes in Computer Science","Advances in Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02837-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T08:45:13Z","timestamp":1573634713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02837-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030028367","9783030028374"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02837-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"MICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexican International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Enseneda","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexico","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"micai2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.micai.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}