{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:27Z","timestamp":1742913627216,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030963071"},{"type":"electronic","value":"9783030963088"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_51","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:15:41Z","timestamp":1648300541000},"page":"548-558","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementation-Oriented Feature Selection in UNSW-NB15 Intrusion Detection Dataset"],"prefix":"10.1007","author":[{"given":"Mohammed M.","family":"Alani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1\u20136 (2015). IEEE","key":"51_CR1","DOI":"10.1109\/MilCIS.2015.7348942"},{"unstructured":"UNSW-NB15 - Google Scholar (2021). Accessed 30 Sept 2021. https:\/\/scholar.google.com\/scholar?q=unsw-nb15","key":"51_CR2"},{"doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems. In: 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), pp. 25\u201331. IEEE (2015)","key":"51_CR3","DOI":"10.1109\/BADGERS.2015.014"},{"issue":"2","key":"51_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C Elkan","year":"2000","unstructured":"Elkan, C.: Results of the KDD\u201999 classifier learning. ACM SIGKDD Explorat. Newslett. 1(2), 63\u201364 (2000)","journal-title":"ACM SIGKDD Explorat. Newslett."},{"doi-asserted-by":"crossref","unstructured":"Janarthanan, T., Zargari, S.: Feature selection in UNSW-NB15 AND KDDCUP\u2019 99 datasets. In: 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE), pp. 1881\u20131886. IEEE (2017)","key":"51_CR5","DOI":"10.1109\/ISIE.2017.8001537"},{"issue":"10","key":"51_CR6","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.3390\/sym12101666","volume":"12","author":"MS Al-Daweri","year":"2020","unstructured":"Al-Daweri, M.S., Zainol Ariffin, K.A., Abdullah, S., et al.: An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry 12(10), 1666 (2020)","journal-title":"Symmetry"},{"doi-asserted-by":"publisher","unstructured":"Khan, N.M., Nalina Madhav, C., Negi, A., Thaseen, I.S.: Analysis on improving the performance of machine learning models using feature selection technique. In: Abraham, A., Cherukuri, A., Melin, P., Gandhi, N. (eds.) Intelligent Systems Design and Applications, pp. 69\u201377. Springer, Cham, Switzerland (2019). https:\/\/doi.org\/10.1007\/978-3-030-16660-1_7","key":"51_CR7","DOI":"10.1007\/978-3-030-16660-1_7"},{"unstructured":"Kanimozhi, V., Jacob, P.: UNSW-NB15 dataset feature selection and network intrusion detection using deep learning. Int. J. Recent Technol. Eng. 7(5S2), 443\u2013446 (2019)","key":"51_CR8"},{"issue":"1","key":"51_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00379-6","volume":"7","author":"SM Kasongo","year":"2020","unstructured":"Kasongo, S.M., Sun, Y.: Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. J. Big Data 7(1), 1\u201320 (2020)","journal-title":"J. Big Data"},{"issue":"6","key":"51_CR10","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.3390\/sym12061046","volume":"12","author":"O Almomani","year":"2020","unstructured":"Almomani, O.: A feature selection model for network intrusion detection system based on PSO, GWO, FFA and GA algorithms. Symmetry 12(6), 1046 (2020)","journal-title":"Symmetry"},{"doi-asserted-by":"crossref","unstructured":"Moualla, S., Khorzom, K., Jafar, A.: Improving the performance of machine learning-based network intrusion detection systems on the UNSWNB15 dataset. Comput. Intell. Neurosci. 2021 (2021)","key":"51_CR11","DOI":"10.1155\/2021\/5557577"},{"doi-asserted-by":"publisher","unstructured":"Suresh Kumar, P., Akthar, S.: Building an efficient feature selection for intrusion detection system on UNSW-NB15. In: Jyothi, S., Mamatha, D.M., Zhang, YD., Raju, K.S. (eds.) Proceedings of the 2nd International Conference on Computational and Bio Engineering, pp. 641\u2013649 (2021). https:\/\/doi.org\/10.1007\/978-981-16-1941-0_64","key":"51_CR12","DOI":"10.1007\/978-981-16-1941-0_64"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:22:47Z","timestamp":1648300967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_51","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}