{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T19:27:35Z","timestamp":1749497255342},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_15","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T14:07:56Z","timestamp":1544191676000},"page":"178-191","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage"],"prefix":"10.1007","author":[{"given":"Jingbo","family":"Xia","sequence":"first","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yaoxiang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Khayari, R.E.A., Sadre, R,, Haverkort, B.R.: A validation of the pseudo self-similar traffic model. In: International Conference on Dependable Systems and Networks, pp. 727\u2013734. IEEE Computer Society (2002)","DOI":"10.1109\/DSN.2002.1029018"},{"issue":"C","key":"15_CR2","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.neucom.2015.05.089","volume":"168","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Wang, R., Tao, M., et al.: A class-oriented feature selection approach for multi-class imbalanced network traffic datasets based on local and global metrics fusion. Neurocomputing 168(C), 365\u2013381 (2015)","journal-title":"Neurocomputing"},{"key":"15_CR3","unstructured":"Nie, F., Huang, H., Cai, X., et al.: Efficient and robust feature selection via joint \u21132,1-norms minimization. In: International Conference on Neural Information Processing Systems, pp. 1813\u20131821. Curran Associates Inc (2010)"},{"issue":"7","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/TIP.2010.2044958","volume":"19","author":"F Nie","year":"2010","unstructured":"Nie, F., Xu, D., Tsang, I.W., et al.: Flexible manifold embedding: a framework for semi-supervised and unsupervised dimension reduction. IEEE Trans. Image Process. 19(7), 1921\u20131932 (2010)","journal-title":"IEEE Trans. Image Process."},{"issue":"99","key":"15_CR5","first-page":"1-1","volume":"PP","author":"R Wang","year":"2017","unstructured":"Wang, R., Nie, F., Hong, R., et al.: Fast and orthogonal locality preserving projections for dimensionality reduction. IEEE Trans. Image Process. PP(99), 1-1 (2017)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"15_CR6","doi-asserted-by":"publisher","first-page":"5809","DOI":"10.1016\/j.eswa.2010.10.050","volume":"38","author":"J Xie","year":"2011","unstructured":"Xie, J., Wang, C.: Using support vector machines with a novel hybrid feature selection method for diagnosis of erythemato-squamous diseases. Expert Syst. Appl. Int. J. 38(5), 5809\u20135815 (2011)","journal-title":"Expert Syst. Appl. Int. J."},{"issue":"1","key":"15_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jbi.2009.07.008","volume":"43","author":"Y Peng","year":"2010","unstructured":"Peng, Y., Wu, Z., Jiang, J.: A novel feature selection approach for biomedical data classification. J. Biomed. Inform. 43(1), 15\u201323 (2010)","journal-title":"J. Biomed. Inform."},{"key":"15_CR8","unstructured":"Zhang, L.X,, Wang, J.X., Zhao, Y.N., et al.: A novel hybrid feature selection algorithm: using ReliefF estimation for GA-wrapper search. In: International Conference on Machine Learning and Cybernetics, vol. 1, pp. 380\u2013384. IEEE (2004)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-642-24553-4_60","volume-title":"Bio-Inspired Computing and Applications","author":"E Bonilla-Huerta","year":"2012","unstructured":"Bonilla-Huerta, E., Duval, B., Hern\u00e1ndez, J.C.H., Hao, J.-K., Morales-Caporal, R.: Hybrid filter-wrapper with a specialized random multi-parent crossover operator for gene selection and classification problems. In: Huang, D.-S., Gan, Y., Premaratne, P., Han, K. (eds.) ICIC 2011. LNCS, vol. 6840, pp. 453\u2013461. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-24553-4_60"},{"issue":"6","key":"15_CR10","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A., et al.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(6), 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.fss.2011.09.009","volume":"189","author":"SM Vieira","year":"2012","unstructured":"Vieira, S.M., Sousa, J.M.C., Kaymak, U.: Fuzzy criteria for feature selection. Fuzzy Sets Syst. 189(1), 1\u201318 (2012)","journal-title":"Fuzzy Sets Syst."},{"key":"15_CR12","unstructured":"Hall, M.A.: Correlation-based feature selection for discrete and numeric class machine learning. In: Proceedings of the Seventeenth International Conference on Machine Learning, pp. 359\u2013366. Morgan Kaufmann Publishers Inc (2000)"},{"issue":"7","key":"15_CR13","doi-asserted-by":"publisher","first-page":"8144","DOI":"10.1016\/j.eswa.2010.12.156","volume":"38","author":"HH Hsu","year":"2011","unstructured":"Hsu, H.H., Hsieh, C.W., Lu, M.D.: Hybrid feature selection by combining filters and wrappers. Expert Syst. Appl. 38(7), 8144\u20138150 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.knosys.2011.01.015","volume":"25","author":"P Bermejo","year":"2012","unstructured":"Bermejo, P., Ossa, L.D.L., G\u00e1mez, J.A., et al.: Fast wrapper feature subset selection in high-dimensional datasets by means of filter re-ranking. Knowl. Based Syst. 25(1), 35\u201344 (2012)","journal-title":"Knowl. Based Syst."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Wald, R., Khoshgoftaar, T.M., Napolitano, A.: Stability of filter- and wrapper-based feature subset selection. In: IEEE International Conference on TOOLS with Artificial Intelligence, pp. 374\u2013380. IEEE (2014)","DOI":"10.1109\/ICTAI.2013.63"},{"key":"15_CR16","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35488-8","volume-title":"Feature Extraction: Foundations and Applications","year":"2005","unstructured":"Guyon, I., Gunn, S., Nikravesh, M., et al. (eds.): Feature Extraction: Foundations and Applications. Studies in Fuzziness and Soft Computing. Springer, New York (2005). https:\/\/doi.org\/10.1007\/978-3-540-35488-8"},{"issue":"99","key":"15_CR17","first-page":"1","volume":"PP","author":"H Shen","year":"2017","unstructured":"Shen, H., Wang, B.: An effective method for synthesizing multiple-pattern linear arrays with a reduced number of antenna elements. IEEE Trans. Antennas Propag. PP(99), 1 (2017)","journal-title":"IEEE Trans. Antennas Propag."},{"issue":"99","key":"15_CR18","doi-asserted-by":"publisher","first-page":"18179","DOI":"10.1109\/ACCESS.2017.2750489","volume":"5","author":"J Shen","year":"2017","unstructured":"Shen, J., Xia, J., Zhang, X., et al.: Sliding block based hybrid feature subset selection in network traffic. IEEE Access 5(99), 18179\u201318186 (2017)","journal-title":"IEEE Access"},{"issue":"11","key":"15_CR19","doi-asserted-by":"publisher","first-page":"e0165993","DOI":"10.1371\/journal.pone.0165993","volume":"11","author":"J Shen","year":"2016","unstructured":"Shen, J., Xia, J., Dong, S., et al.: Universal feature extraction for traffic identification of the target category. PLoS ONE 11(11), e0165993 (2016)","journal-title":"PLoS ONE"},{"key":"15_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-14058-7_7","volume-title":"Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications","author":"AS Fialho","year":"2010","unstructured":"Fialho, A.S., et al.: Predicting outcomes of septic shock patients using feature selection based on soft computing techniques. In: H\u00fcllermeier, E., Kruse, R., Hoffmann, F. (eds.) IPMU 2010. CCIS, vol. 81, pp. 65\u201374. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14058-7_7"},{"issue":"12","key":"15_CR21","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1016\/j.patcog.2005.11.001","volume":"39","author":"R Ruiz","year":"2006","unstructured":"Ruiz, R., Riquelme, J.C., Aguilar-Ruiz, J.S.: Incremental wrapper-based gene selection from microarray data for cancer classification. Pattern Recogn. 39(12), 2383\u20132392 (2006)","journal-title":"Pattern Recogn."},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Bermejo, P., Gamez, J.A., Puerta, J.M.: Incremental Wrapper-based subset selection with replacement: an advantageous alternative to sequential forward selection. In: IEEE Symposium on Computational Intelligence and Data Mining, 2009 (CIDM 2009), pp. 367\u2013374. IEEE (2009)","DOI":"10.1109\/CIDM.2009.4938673"},{"key":"15_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X","volume-title":"Wrappers for Feature Subset Selection","author":"R Kohavi","year":"1997","unstructured":"Kohavi, R., John, G.H.: Wrappers for Feature Subset Selection. Elsevier, Amsterdam (1997)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Friedman, J., Hastie, T., et al.: The Elements of Statistical Learning, vol. 27, no. 2, pp. 83\u201385. Springer, Heidelberg (2009)","DOI":"10.1007\/978-0-387-84858-7"},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2011.181","volume":"25","author":"Q Song","year":"2012","unstructured":"Song, Q., Ni, J., Wang, G.: A fast clustering-based feature subset selection algorithm for high-dimensional data. IEEE Trans. Knowl. Data Eng. 25(1), 1\u201314 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"15_CR26","volume-title":"C4. 5: Programs for Machine Learning","author":"JR Quinlan","year":"1992","unstructured":"Quinlan, J.R.: C4. 5: Programs for Machine Learning. Morgan Kaufmann, Los Altos (1992)"},{"key":"15_CR27","unstructured":"Moore, A.W.: Dataset. http:\/\/www.cl.cam.ac.uk\/research\/srg\/netos\/nprobe\/data\/papers . Accessed Aug 2013"},{"issue":"5","key":"15_CR28","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1093\/comjnl\/bxq039","volume":"54","author":"B Croft","year":"2011","unstructured":"Croft, B., Metzler, D., Search, S.T.: Engines\u2014information retrieval in practice. Comput. J. 54(5), 831\u2013832 (2011)","journal-title":"Comput. J."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T21:28:20Z","timestamp":1662586100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}