{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:17Z","timestamp":1742914277282,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030736026"},{"type":"electronic","value":"9783030736033"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73603-3_19","type":"book-chapter","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T06:04:19Z","timestamp":1617948259000},"page":"206-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning for Intrusion Detection: Design and Implementation of an IDS Based on Artificial Neural Network"],"prefix":"10.1007","author":[{"given":"Younes","family":"Wadiai","sequence":"first","affiliation":[]},{"given":"Yousef","family":"El Mourabit","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Baslam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,10]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Liu, G., Zhang, J.: CNID: research of network intrusion detection based on convolutional neural network. Discrete Dyn. Nat. Soc. 2020 (2020)","DOI":"10.1155\/2020\/4705982"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Panigrahi, R., Borah, S.: A statistical analysis of lazy classifiers using Canadian Institute of Cybersecurity datasets. In: Advances in Data Science and Management, pp. 215\u2013222. Springer, Singapore (2020)","DOI":"10.1007\/978-981-15-0978-0_21"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Jaber, F.Kh., Al-Zwainy, F.M.S., Hachem, S.W.: Optimizing of predictive performance for construction projects utilizing support vector machine technique. Cogent Eng. 6(1), 1685860 (2019)","DOI":"10.1080\/23311916.2019.1685860"},{"issue":"2","key":"19_CR4","doi-asserted-by":"publisher","first-page":"2969","DOI":"10.3233\/JIFS-190078","volume":"37","author":"R Jain","year":"2019","unstructured":"Jain, R., et al.: Assessing risk in life insurance using ensemble learning. J. Intell. Fuzzy Syst. 37(2), 2969\u20132980 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"110441","DOI":"10.1016\/j.forsciint.2020.110441","volume":"315","author":"DH Toneva","year":"2020","unstructured":"Toneva, D.H., et al.: Data mining for sex estimation based on cranial measurements. Forensic Sci. Int. 315, 110441 (2020)","journal-title":"Forensic Sci. Int."},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Baglaeva, E., et al.: Recognition of chromium distribution features in different urban soils by multilayer perceptron. In: AIP Conference Proceedings, vol. 2040, no. 1. AIP Publishing LLC (2018)","DOI":"10.1063\/1.5079106"},{"issue":"1","key":"19_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12931-020-01509-7","volume":"21","author":"D Jaffuel","year":"2020","unstructured":"Jaffuel, D., et al.: Patterns of adaptive servo-ventilation settings in a real-life multicenter study: pay attention to volume! Respir. Res. 21(1), 1\u201313 (2020)","journal-title":"Respir. Res."},{"issue":"3","key":"19_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.4310\/SII.2009.v2.n3.a8","volume":"2","author":"T Hastie","year":"2009","unstructured":"Hastie, T., et al.: Multi-class adaboost. Stat. Interface 2(3), 349\u2013360 (2009)","journal-title":"Stat. Interface"},{"issue":"1","key":"19_CR9","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00521-016-2418-1","volume":"28","author":"J Kevric","year":"2017","unstructured":"Kevric, J., Jukic, S., Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051\u20131058 (2017)","journal-title":"Neural Comput. Appl."},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"12499","DOI":"10.1007\/s00521-020-04708-x","volume":"32","author":"P Devan","year":"2020","unstructured":"Devan, P., Khare, N.: An efficient XGBoost\u2013DNN-based classification model for network intrusion detection system. Neural Comput. Appl. 32, 12499\u201312514 (2020)","journal-title":"Neural Comput. Appl."},{"key":"19_CR11","unstructured":"Cauwenberghs, G., Poggio, T.: Incremental and decremental support vector machine learning. In: Advances in Neural Information Processing Systems (2001)"},{"key":"19_CR12","unstructured":"Rish, I.: An empirical study of the naive Bayes classifier. In: IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, vol. 3, no. 22 (2001)"},{"key":"19_CR13","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983433","volume-title":"Applied Logistic Regression Analysis","author":"S Menard","year":"2002","unstructured":"Menard, S.: Applied Logistic Regression Analysis, vol. 106. Sage, Thousand Oaks (2002)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Kunhare, N., Tiwari, R., Dhar, J.: Particle swarm optimization and feature selection for intrusion detection system. Sadhana 45(1) (2020)","DOI":"10.1007\/s12046-020-1308-5"},{"issue":"4","key":"19_CR15","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1007\/s00521-017-3128-z","volume":"31","author":"BA Tama","year":"2019","unstructured":"Tama, B.A., Rhee, K.-H.: An in-depth experimental study of anomaly detection using gradient boosted machine. Neural Comput. Appl. 31(4), 955\u2013965 (2019)","journal-title":"Neural Comput. Appl."},{"issue":"19","key":"19_CR16","doi-asserted-by":"publisher","first-page":"3986","DOI":"10.1177\/1077546314568172","volume":"22","author":"J Zhou","year":"2016","unstructured":"Zhou, J., Shi, X., Li, X.: Utilizing gradient boosted machine for the prediction of damage to residential structures owing to blasting vibrations of open pit mining. J. Vib. Control 22(19), 3986\u20133997 (2016)","journal-title":"J. Vib. Control"},{"issue":"6","key":"19_CR17","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1021\/ci034160g","volume":"43","author":"V Svetnik","year":"2003","unstructured":"Svetnik, V., et al.: Random forest: a classification and regression tool for compound classification and QSAR modeling. J. Chem. Inf. Comput. Sci. 43(6), 1947\u20131958 (2003)","journal-title":"J. Chem. Inf. Comput. Sci."},{"issue":"5","key":"19_CR18","doi-asserted-by":"publisher","first-page":"10549","DOI":"10.1007\/s10586-017-1109-8","volume":"22","author":"S Aljawarneh","year":"2019","unstructured":"Aljawarneh, S., Yassein, M.B., Aljundi, M.: An enhanced J48 classification algorithm for the anomaly intrusion detection systems. Clust. Comput. 22(5), 10549\u201310565 (2019)","journal-title":"Clust. Comput."},{"issue":"6","key":"19_CR19","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., Shantharajah, S.P.: A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int. J. Adv. Res. Comput. Commun. Eng. 4(6), 446\u2013452 (2015)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"6","key":"19_CR20","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.3233\/IDA-173624","volume":"22","author":"M Belouch","year":"2018","unstructured":"Belouch, M., Elhadaj, S., Idhammad, M.: A hybrid filter-wrapper feature selection method for DDoS detection in cloud computing. Intell. Data Anal. 22(6), 1209\u20131226 (2018)","journal-title":"Intell. Data Anal."},{"issue":"3","key":"19_CR21","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.3233\/IFS-141419","volume":"28","author":"S Shamshirband","year":"2015","unstructured":"Shamshirband, S., et al.: Co-FQL: anomaly detection using cooperative fuzzy Q-learning in network. J. Intell. Fuzzy Syst. 28(3), 1345\u20131357 (2015)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"1","key":"19_CR22","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.3233\/JIFS-182560","volume":"37","author":"Z Yi","year":"2019","unstructured":"Yi, Z., et al.: A navigation method for mobile robots using interval type-2 fuzzy neural network fitting Q-learning in unknown environments. J. Intell. Fuzzy Syst. 37(1), 1113\u20131121 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"1","key":"19_CR23","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10922-018-9459-y","volume":"27","author":"F Hachmi","year":"2019","unstructured":"Hachmi, F., Boujenfa, K., Limam, M.: Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization. J. Netw. Syst. Manage. 27(1), 93\u2013120 (2019)","journal-title":"J. Netw. Syst. Manage."},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Castillo, O., et al.: Fuzzy parameter adaptation in genetic algorithms for the optimization of fuzzy integrators in modular neural networks for multimodal biometry. Computaci\u00f3n y Sistemas 24(3) (2020)","DOI":"10.13053\/cys-24-3-3329"},{"issue":"3","key":"19_CR25","doi-asserted-by":"publisher","first-page":"3229","DOI":"10.3233\/JIFS-191198","volume":"38","author":"D S\u00e1nchez","year":"2020","unstructured":"S\u00e1nchez, D., Melin, P., Castillo, O.: Comparison of particle swarm optimization variants with fuzzy dynamic parameter adaptation for modular granular neural networks for human recognition. J. Intell. Fuzzy Syst. 38(3), 3229\u20133252 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"9","key":"19_CR26","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1080\/00207721.2020.1772403","volume":"51","author":"T Cui","year":"2020","unstructured":"Cui, T., et al.: Data filtering-based parameter and state estimation algorithms for state-space systems disturbed by coloured noises. Int. J. Syst. Sci. 51(9), 1669\u20131684 (2020)","journal-title":"Int. J. Syst. Sci."},{"issue":"6","key":"19_CR27","doi-asserted-by":"publisher","first-page":"260","DOI":"10.3390\/e19060260","volume":"19","author":"B Hu","year":"2017","unstructured":"Hu, B., Bi, L., Dai, S.: Information distances versus entropy metric. Entropy 19(6), 260 (2017)","journal-title":"Entropy"}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73603-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T06:15:20Z","timestamp":1617948920000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-73603-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030736026","9783030736033"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73603-3_19","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations in Bio-Inspired Computing and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibica2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/ibica20\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}