{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:41:25Z","timestamp":1743115285231,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031430848"},{"type":"electronic","value":"9783031430855"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-43085-5_5","type":"book-chapter","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T11:02:15Z","timestamp":1695985335000},"page":"55-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing an\u00a0IDS (Intrusion Detection System) by\u00a0Means of\u00a0Advanced Metaheuristics"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1603-9105","authenticated-orcid":false,"given":"A.M.","family":"Mora","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5576-4417","authenticated-orcid":false,"given":"M.G.","family":"Arenas","sequence":"additional","affiliation":[]},{"given":"A.","family":"Romero-Horno","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9804-8122","authenticated-orcid":false,"given":"J.","family":"Camacho-P\u00e1ez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7224-1485","authenticated-orcid":false,"given":"P.A.","family":"Castillo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,30]]},"reference":[{"key":"5_CR1","volume-title":"Computer security threat monitoring and surveillance","author":"JP Anderson","year":"1980","unstructured":"Anderson, J.P.: Computer security threat monitoring and surveillance. James P. Anderson Company, Technical Report (1980)"},{"key":"5_CR2","unstructured":"Hathaway, O.A., et al.: The law of cyber-attack. California law review, pp. 817\u2013885 (2012)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Sabahi, F., Movaghar, A.: Intrusion detection: a survey. In: 2008 Third International Conference on Systems and Networks Communications, pp. 23\u201326. IEEE (2008)","DOI":"10.1109\/ICSNC.2008.44"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.cose.2016.02.008","volume":"59","author":"J Camacho","year":"2016","unstructured":"Camacho, J., P\u00e9rez-Villegas, A., Garc\u00eda-Teodoro, P., Maci\u00e1-Fern\u00e1ndez, G.: Pca-based multivariate statistical network monitoring for anomaly detection. Comput. Secur. 59, 118\u2013137 (2016)","journal-title":"Comput. Secur."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philosophical Trans. Roy. Soc. A Math. Phys. Eng. Sci. 374(2065), 20150202 (2016)","DOI":"10.1098\/rsta.2015.0202"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.cose.2017.11.004","volume":"73","author":"G Maci\u00e1-Fern\u00e1ndez","year":"2018","unstructured":"Maci\u00e1-Fern\u00e1ndez, G., Camacho, J., Mag\u00e1n-Carri\u00f3n, R., Garc\u00eda-Teodoro, P., Ther\u00f3n, R.: Ugr \u201916: a new dataset for the evaluation of cyclostationarity-based network idss. Comput. Secur. 73, 411\u2013424 (2018)","journal-title":"Comput. Secur."},{"issue":"8","key":"5_CR7","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TIFS.2019.2894358","volume":"14","author":"J Camacho","year":"2019","unstructured":"Camacho, J., Maci\u00e1-Fern\u00e1ndez, G., Fuentes-Garc\u00eda, N.M., Saccenti, E.: Semi-supervised multivariate statistical network monitoring for learning security threats. IEEE Trans. Inf. Forensics Secur. 14(8), 2179\u20132189 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1002\/aic.11205","volume":"53","author":"J Camacho","year":"2007","unstructured":"Camacho, J., Pic\u00f3, J., Ferrer, A.: Self-tuning run to run optimization of fed-batch processes using unfold-pls. AIChE J. 53(7), 1789\u20131804 (2007)","journal-title":"AIChE J."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to evolutionary computing. Springer (2015)","DOI":"10.1007\/978-3-662-44874-8"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Eberhart, R., Kennedy, J.: Particle swarm optimization. In: Proceedings of the IEEE International Conference on Neural Networks, 4, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"He, Y., Ma, W.J., Zhang, J.P.: The parameters selection of pso algorithm influencing on performance of fault diagnosis. In: MATEC Web of Conferences, vol. 63, EDP Sciences (2016) 02019","DOI":"10.1051\/matecconf\/20166302019"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Van Laarhoven, P.J., Aarts, E.H., van Laarhoven, P.J., Aarts, E.H.: Simulated annealing. Springer (1987)","DOI":"10.1007\/978-94-015-7744-1_2"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100\u2013123 (2014)","DOI":"10.1016\/j.cose.2014.05.011"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/4586875","volume":"2020","author":"S Rajagopal","year":"2020","unstructured":"Rajagopal, S., Kundapur, P.P., Hareesha, K.S.: A stacking ensemble for network intrusion detection using heterogeneous datasets. Secur. Commun. Networks 2020, 1\u20139 (2020)","journal-title":"Secur. Commun. Networks"},{"issue":"10","key":"5_CR15","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.3390\/app10103430","volume":"10","author":"X Larriva-Novo","year":"2020","unstructured":"Larriva-Novo, X., Vega-Barbas, M., Villagra, V.A., Rivera, D., Alvarez-Campana, M., Berrocal, J.: Efficient distributed preprocessing model for machine learning-based anomaly detection over large-scale cybersecurity datasets. Appl. Sci. 10(10), 3430 (2020)","journal-title":"Appl. Sci."},{"key":"5_CR16","unstructured":"Fuentes Garc\u00eda, N.M., et al.: Multivariate statistical network monitoring for network security based on principal component analysis (2021)"},{"issue":"4","key":"5_CR17","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TETC.2022.3178283","volume":"10","author":"R Mag\u00e1n-Carri\u00f3n","year":"2022","unstructured":"Mag\u00e1n-Carri\u00f3n, R., Urda, D., Diaz-Cano, I., Dorronsoro, B.: Improving the reliability of network intrusion detection systems through dataset integration. IEEE Trans. Emerg. Top. Comput. 10(4), 1717\u20131732 (2022)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Boardman, T.J.: The statistician who changed the world: W. edwards deming, 1900\u20131993. Am. Statistician 48(3), 179\u2013187 (1994)","DOI":"10.1080\/00031305.1994.10476053"},{"key":"5_CR19","unstructured":"Lofberg, J.: Yalmip: A toolbox for modeling and optimization in matlab. In,: IEEE international conference on robotics and automation (IEEE Cat. No. 04CH37508). IEEE 2004, 284\u2013289 (2004)"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.chemolab.2015.02.016","volume":"143","author":"J Camacho","year":"2015","unstructured":"Camacho, J., P\u00e9rez-Villegas, A., Rodr\u00edguez-G\u00f3mez, R.A., Jim\u00e9nez-Ma\u00f1as, E.: Multivariate exploratory data analysis (meda) toolbox for matlab. Chemom. Intell. Lab. Syst. 143, 49\u201357 (2015)","journal-title":"Chemom. Intell. Lab. Syst."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.H., Friedman, J.H.: The elements of statistical learning: data mining, inference, and prediction. Volume 2. Springer (2009)","DOI":"10.1007\/978-0-387-84858-7"},{"issue":"2","key":"5_CR22","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1162\/106365601750190406","volume":"9","author":"K Deb","year":"2001","unstructured":"Deb, K., Beyer, H.G.: Self-adaptive genetic algorithms with simulated binary crossover. Evol. Comput. 9(2), 197\u2013221 (2001)","journal-title":"Evol. Comput."},{"issue":"11","key":"5_CR23","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.3390\/sym12111758","volume":"12","author":"MA Albadr","year":"2020","unstructured":"Albadr, M.A., Tiun, S., Ayob, M., Al-Dhief, F.: Genetic algorithm based on natural selection theory for optimization problems. Symmetry 12(11), 1758 (2020)","journal-title":"Symmetry"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Lan, K.T., Lan, C.H.: Notes on the distinction of gaussian and cauchy mutations. In: 2008 Eighth International Conference on Intelligent Systems Design and Applications. Volume 1, IEEE (2008) 272\u2013277","DOI":"10.1109\/ISDA.2008.237"}],"container-title":["Lecture Notes in Computer Science","Advances in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-43085-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:07:59Z","timestamp":1730218079000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-43085-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031430848","9783031430855"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-43085-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"30 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Work-Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ponta Delgada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwann2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwann.uma.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"108","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}