{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:44Z","timestamp":1742914184871,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953874"},{"type":"electronic","value":"9783030953881"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95388-1_37","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:20:55Z","timestamp":1645518055000},"page":"555-570","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FSAFA-stacking2: An Effective Ensemble Learning Model for Intrusion Detection with Firefly Algorithm Based Feature Selection"],"prefix":"10.1007","author":[{"given":"Guo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Junyao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Shijun","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jieying","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Weigang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"37_CR1","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA (1980)"},{"key":"37_CR2","unstructured":"Brugger, T.: Kdd cup \u201999 dataset (network intrusion) considered harmful. Technical report, Department of Computer Science, UC Davis (2007). https:\/\/www.kdnuggets.com\/news\/2007\/n18\/4i.html"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Demir, N., DALKILI\u00c7, G.: Modified stacking ensemble approach to detect network intrusion. Turkish J. Electr. Eng. Comput. Sci. 26(1), 418\u2013433 (2018)","DOI":"10.3906\/elk-1702-279"},{"key":"37_CR4","unstructured":"Didaci, L., Giacinto, G., Roli, F.: Ensemble learning for intrusion detection in computer networks. In: Workshop Machine Learning Methods Applications, Siena, Italy (2002)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"El Farissi, I., Saber, M., Chadli, S., Emharraf, M., Belkasmi, M.G.: The analysis performance of an intrusion detection systems based on neural network. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 145\u2013151. IEEE (2016)","DOI":"10.1109\/CIST.2016.7805032"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.pisc.2016.04.005","volume":"8","author":"SK Gautam","year":"2016","unstructured":"Gautam, S.K., Om, H.: Computational neural network regression model for host based intrusion detection system. Perspectives in Science 8, 93\u201395 (2016)","journal-title":"Perspectives in Science"},{"issue":"1","key":"37_CR7","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"SJ Horng","year":"2011","unstructured":"Horng, S.J., et al.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1), 306\u2013313 (2011)","journal-title":"Expert Syst. Appl."},{"key":"37_CR8","unstructured":"Idowu, R.K., Muniyandi, R.C., Lateef, U.O.: Tackling the menace of curse of dimensionality in intrusion detection systems: membrane computing approach. In: Proceedings of the 2nd Interdisciplinary conference of TASUED-UCC 2016, pp. 1539\u20131549 (2016)"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21\u201326 (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"issue":"1","key":"37_CR10","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00521-016-2418-1","volume":"28","author":"J Kevric","year":"2016","unstructured":"Kevric, J., Jukic, S., Subasi, A.: An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Comput. Appl. 28(1), 1051\u20131058 (2016). https:\/\/doi.org\/10.1007\/s00521-016-2418-1","journal-title":"Neural Comput. Appl."},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi, C., Krichen, S.: A GA-LR wrapper approach for feature selection in network intrusion detection. Comput. Secur. 70, 255\u2013277 (2017)","journal-title":"Comput. Secur."},{"issue":"4","key":"37_CR12","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jksus.2018.03.018","volume":"31","author":"M Mazini","year":"2019","unstructured":"Mazini, M., Shirazi, B., Mahdavi, I.: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and adaboost algorithms. J. King Saud Univ. Comput. Inf. Sci. 31(4), 541\u2013553 (2019)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1\u20133","key":"37_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf. Secur. J. Global Perspect. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inf. Secur. J. Global Perspect."},{"key":"37_CR15","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1016\/j.future.2017.09.056","volume":"79","author":"D Papamartzivanos","year":"2018","unstructured":"Papamartzivanos, D., M\u00e1rmol, F.G., Kambourakis, G.: Dendron: Genetic trees driven rule induction for network intrusion detection systems. Futur. Gener. Comput. Syst. 79, 558\u2013574 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Potluri, S., Diedrich, C.: Accelerated deep neural networks for enhanced intrusion detection system. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20138. IEEE (2016)","DOI":"10.1109\/ETFA.2016.7733515"},{"key":"37_CR17","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2018.11.010","volume":"148","author":"F Salo","year":"2019","unstructured":"Salo, F., Nassif, A.B., Essex, A.: Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Comput. Netw. 148, 164\u2013175 (2019)","journal-title":"Comput. Netw."},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Saxena, H., Richariya, V.: Intrusion detection in kdd99 dataset using SVM-PSO and feature reduction with information gain. Int. J. Comput. Appl. 98(6), 25\u201329 (2014)","DOI":"10.5120\/17188-7369"},{"key":"37_CR19","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.cose.2018.11.005","volume":"81","author":"B Selvakumar","year":"2019","unstructured":"Selvakumar, B., Muneeswaran, K.: Firefly algorithm based feature selection for network intrusion detection. Comput. Secur. 81, 148\u2013155 (2019)","journal-title":"Comput. Secur."},{"issue":"15","key":"37_CR20","first-page":"8","volume":"99","author":"AK Shrivas","year":"2014","unstructured":"Shrivas, A.K., Dewangan, A.K.: An ensemble model for classification of attacks with feature selection based on kdd99 and NSL-KDD data set. Int. J. Comput. Appl. 99(15), 8\u201313 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Sornsuwit, P., Jaiyen, S.: Intrusion detection model based on ensemble learning for u2r and r2l attacks. In: 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE), pp. 354\u2013359. IEEE (2015)","DOI":"10.1109\/ICITEED.2015.7408971"},{"key":"37_CR22","unstructured":"Sun, C., Xing, J.c., Yang, Q.l., Han, D.s.: Intrusion detection methods based on improved naive bayesian. Microcomputer Appl. 36(01), 8\u201310 (2017)"},{"issue":"6","key":"37_CR23","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1049\/iet-ifs.2014.0353","volume":"9","author":"W Wang","year":"2015","unstructured":"Wang, W., He, Y., Liu, J., Gombault, S.: Constructing important features from massive network traffic for lightweight intrusion detection. IET Inf. Secur. 9(6), 374\u2013379 (2015)","journal-title":"IET Inf. Secur."},{"issue":"1","key":"37_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu, S.X., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1\u201335 (2010)","journal-title":"Appl. Soft Comput."},{"key":"37_CR25","unstructured":"Zhi, H.: Research on intrusion detection model based on dimensional reduction and improved CS-WNN. Master\u2019s thesis, Lanzhou University (2018)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95388-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:33:22Z","timestamp":1645518802000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95388-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953874","9783030953881"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95388-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}