{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T03:58:58Z","timestamp":1754193538453},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_35","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"873-888","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Machine Learning Based Intrusion Detection Techniques"],"prefix":"10.1007","author":[{"given":"Kishor Kumar","family":"Gulla","sequence":"first","affiliation":[]},{"given":"P.","family":"Viswanath","sequence":"additional","affiliation":[]},{"given":"Suresh Babu","family":"Veluru","sequence":"additional","affiliation":[]},{"given":"R. Raja","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"35_CR1","volume-title":"Intrusion detection systems: A survey and taxonomy","author":"S Axelsson","year":"2000","unstructured":"Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy."},{"key":"35_CR2","unstructured":"Frank, J. (1994). Artificial intelligence and intrusion detection: Current and future directions. In Proceedings of the 17th National Computer Security Conference."},{"issue":"3","key":"35_CR3","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/TKDE.2007.44","volume":"19","author":"S R Gaddam","year":"2007","unstructured":"Gaddam, S. R., Phoha, V. V., & Balagani, K. S. (2007). K-Means+ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods. IEEE Transactions on Knowledge and Data Engineering, 19(3), 345\u2013354.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"35_CR4","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K Ilgun","year":"1995","unstructured":"Ilgun, K., & Kemmerer, A. (1995). State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering, 21(3), 181\u2013199.","journal-title":"IEEE Transaction on Software Engineering"},{"key":"35_CR5","unstructured":"Kumar, G. K., Viswanath, P., & Rao, A. A. (2011). Intrusion detection using an ensemble of decision trees. In Indian International Conference on Artificial Intelligence (pp. 382\u2013392)."},{"issue":"2","key":"35_CR6","first-page":"36","volume":"9","author":"G K Kumar","year":"2015","unstructured":"Kumar, G. K., Viswanath, P., & Rao, A. A. (2015). Ensemble of soft decision trees using multiple approximate fuzzy-rough set based reducts. International Journal of Information Processing, 9(2), 36\u201346.","journal-title":"International Journal of Information Processing"},{"issue":"3","key":"35_CR7","first-page":"273","volume":"41","author":"G K Kumar","year":"2016","unstructured":"Kumar, G. K., Viswanath, P., & Rao, A. A. (2016). Ensemble of randomized soft decision trees for robust classification. Sadhana, 41(3), 273\u2013282.","journal-title":"Sadhana"},{"key":"35_CR8","unstructured":"Lee, W., & Stolfo, S. J. (1998). Data mining approaches for intrusion detection. In 7th USENIX Security Symposium."},{"key":"35_CR9","unstructured":"Lichman, M. (2013). UCI machine learning repository. \nhttp:\/\/archive.ics.uci.edu\/ml\n\n, University of California, Irvine, School of Information and Computer Sciences."},{"key":"35_CR10","unstructured":"Lincoln Laboratory MIT.DARPA intrusion detection data sets. \nhttp:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html\n\n."},{"key":"35_CR11","unstructured":"Lippman, R. P., Fried, D. J., Graf, I., & Zissman, M. A. (2000). Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of DARPA Information Survivability Conference and Exosition (pp. 12\u201326)."},{"key":"35_CR12","first-page":"59","volume-title":"Proceedings of 1988 IEEE Computer Society Symposium on Research in Security and Privacy","author":"T Lunt","year":"1994","unstructured":"Lunt, T., & Jagannathan, R. (1994). A prototype real-time intrusion-detection expert system. In Proceedings of 1988 IEEE Computer Society Symposium on Research in Security and Privacy (pp. 59\u201366). Washington: IEEE Computer Society Press."},{"key":"35_CR13","volume-title":"Integrating fuzzy logic with data mining methods for intrusion detection","author":"J Luo","year":"1999","unstructured":"Luo, J. (1999). Integrating fuzzy logic with data mining methods for intrusion detection."},{"issue":"3","key":"35_CR14","first-page":"26","volume":"8","author":"B Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, L., & Levitt, K. (1994). Network intrusion detection. Computer Networks, 8(3), 26\u201341.","journal-title":"Computer Networks"},{"key":"35_CR15","unstructured":"Smaha, S. (1998). Haystack: An intrusion detection system. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (pp. 37\u201344)."},{"key":"35_CR16","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-642-21786-9_54","volume-title":"4th International Conference on Pattern Recognition and Machine Intelligence","author":"L Zhou","year":"2011","unstructured":"Zhou, L., & Jiang, F. (2011). A rough set based decision tree algorithm and its application in intrusion detection. In 4th International Conference on Pattern Recognition and Machine Intelligence (pp. 333\u2013338). Berlin: Springer."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:07:55Z","timestamp":1577794075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_35","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}