{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:12:13Z","timestamp":1743127933506,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030963071"},{"type":"electronic","value":"9783030963088"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_80","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:15:41Z","timestamp":1648300541000},"page":"859-869","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Designing Scalable Intrusion Detection Systems with Stacking Based Ensemble Learning"],"prefix":"10.1007","author":[{"given":"A. Sujan","family":"Reddy","sequence":"first","affiliation":[]},{"given":"S.","family":"Akashdeep","sequence":"additional","affiliation":[]},{"given":"S. Sowmya","family":"Kamath","sequence":"additional","affiliation":[]},{"given":"Bhawana","family":"Rudra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"issue":"3","key":"80_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/65.283931","volume":"8","author":"B Mukherjee","year":"1994","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network 8(3), 26\u201341 (1994)","journal-title":"IEEE Network"},{"issue":"8","key":"80_CR2","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H Debar","year":"1999","unstructured":"Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion detection systems. Comput. Netw. 31(8), 805\u2013822 (1999)","journal-title":"Comput. Netw."},{"key":"80_CR3","doi-asserted-by":"crossref","unstructured":"Vigna, G., Kemmerer, R.A.: NetSTAT: a network-based intrusion detection approach. In: Proceedings 14th Annual Computer Security Applications Conference (Cat. No. 98EX217), pp. 25\u201334. IEEE (1998)","DOI":"10.1109\/CSAC.1998.738566"},{"key":"80_CR4","unstructured":"Smaha, S.E., et al.: Haystack: an intrusion detection system. In: Fourth Aerospace Computer Security Applications Conference, vol. 44, Orlando, FL, USA (1988)"},{"key":"80_CR5","unstructured":"Kumar, S.: Classification and detection of computer intrusions. Ph.D. thesis, Purdue University (1995)"},{"key":"80_CR6","doi-asserted-by":"crossref","unstructured":"Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. CRC Press, New York (2016)","DOI":"10.1201\/b10867"},{"key":"80_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249","volume":"148","author":"H Alazzam","year":"2020","unstructured":"Alazzam, H., Sharieh, A., Sabri, K.E.: A feature selection algorithm for intrusion detection system based on pigeon inspired optimizer. Expert Syst. Appl. 148, 113249 (2020)","journal-title":"Expert Syst. Appl."},{"key":"80_CR8","doi-asserted-by":"publisher","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","volume":"7","author":"R Vinayakumar","year":"2019","unstructured":"Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Al- Nemrat, A., Venkatraman, S.: Deep learning approach for intelligent intrusion detection system. IEEE Access 7, 41525\u201341550 (2019)","journal-title":"IEEE Access"},{"key":"80_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.neucom.2019.11.016","volume":"387","author":"C Ieracitano","year":"2020","unstructured":"Ieracitano, C., Adeel, A., Morabito, F.C., Hussain, A.: A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 387, 51\u201362 (2020)","journal-title":"Neurocomputing"},{"key":"80_CR10","doi-asserted-by":"publisher","first-page":"82512","DOI":"10.1109\/ACCESS.2019.2923640","volume":"7","author":"X Gao","year":"2019","unstructured":"Gao, X., Shan, C., Hu, C., Niu, Z., Liu, Z.: An adaptive ensemble machine learning model for intrusion detection. IEEE Access 7, 82512\u201382521 (2019)","journal-title":"IEEE Access"},{"issue":"7","key":"80_CR11","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s10489-018-01408-x","volume":"49","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2019","unstructured":"\u00c7avu\u015fo\u011flu, \u00dc.: A new hybrid approach for intrusion detection using machine learning methods. Appl. Intell. 49(7), 2735\u20132761 (2019). https:\/\/doi.org\/10.1007\/s10489-018-01408-x","journal-title":"Appl. Intell."},{"key":"80_CR12","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"80_CR13","unstructured":"Byrd, J., Lipton, Z.: What is the effect of importance weighting in deep learning? In: International Conference on Machine Learning, pp. 872\u2013881. PMLR (2019)"},{"key":"80_CR14","doi-asserted-by":"publisher","first-page":"38597","DOI":"10.1109\/ACCESS.2019.2905633","volume":"7","author":"SM Kasongo","year":"2019","unstructured":"Kasongo, S.M., Sun, Y.: A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access 7, 38597\u201338607 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"80_CR15","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1145\/42411.42415","volume":"31","author":"JL Gustafson","year":"1988","unstructured":"Gustafson, J.L.: Reevaluating Amdahl\u2019s law. Commun. ACM 31(5), 532\u2013533 (1988)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T01:48:16Z","timestamp":1726883296000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_80","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}