{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:17:18Z","timestamp":1743128238247,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031554858"},{"type":"electronic","value":"9783031554865"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-55486-5_5","type":"book-chapter","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T07:02:33Z","timestamp":1709708553000},"page":"54-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data-Driven Approach to\u00a0Network Intrusion Detection System Using Modified Artificial Bee Colony Algorithm for\u00a0Nature-Inspired Cybersecurity"],"prefix":"10.1007","author":[{"given":"V. B.","family":"Gupta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3308-4445","authenticated-orcid":false,"given":"Shishir Kumar","family":"Shandilya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6617-313X","authenticated-orcid":false,"given":"Chirag","family":"Ganguli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3378-2945","authenticated-orcid":false,"given":"Gaurav","family":"Choudhary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,7]]},"reference":[{"key":"5_CR1","unstructured":"O. S. Soliman, A. Rassem, A network intrusions detection system based on a quantum bio inspired algorithm"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"M. Aldwairi, Y. Khamayseh, M. Al-Masri, Application of artificial bee colony for intrusion detection systems, Security and Communication Networks 8. https:\/\/doi.org\/10.1002\/sec.588","DOI":"10.1002\/sec.588"},{"key":"5_CR3","unstructured":"M. Celik, R. Kurban, T. Kurban, Artificial bee colony algorithm for anomaly based intrusion detection"},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1362\/1\/012132","volume":"1362","author":"A Mohammed","year":"2019","unstructured":"Mohammed, A., Yasir, A.: An understanding of artificial bee colony algorithm from the perspective of computation and applied mathematics: A comparative study. J. Phys: Conf. Ser. 1362, 012132 (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1362\/1\/012132","journal-title":"J. Phys: Conf. Ser."},{"issue":"7","key":"5_CR5","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1016\/j.jksuci.2018.09.017","volume":"32","author":"K Hussain","year":"2020","unstructured":"Hussain, K., Salleh, M.N.M., Cheng, S., Shi, Y., Naseem, R.: Artificial bee colony algorithm: A component-wise analysis using diversity measurement. Journal of King Saud University-Computer and Information Sciences 32(7), 794\u2013808 (2020)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"5_CR6","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/634\/1\/012056","volume":"634","author":"P Zhang","year":"2021","unstructured":"Zhang, P., Liu, Y.: Application of an improved artificial bee colony algorithm. IOP Conference Series: Earth and Environmental Science 634, 012056 (2021). https:\/\/doi.org\/10.1088\/1755-1315\/634\/1\/012056","journal-title":"IOP Conference Series: Earth and Environmental Science"},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"M.-T. Ramsey, M. Bencsik, M. Newton, M. Reyes, M. Pioz, D. Crauser, N. Simon-Delso, Y. Le Conte, The prediction of swarming in honeybee colonies using vibrational spectra, Scientific Reports 10. https:\/\/doi.org\/10.1038\/s41598-020-66115-5","DOI":"10.1038\/s41598-020-66115-5"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"B. Wang, Z. Mao, Outlier detection based on gaussian process with application to industrial processes, Appl. Soft Comput. 76 (C) (2019) 505\u2013516. https:\/\/doi.org\/10.1016\/j.asoc.2018.12.029","DOI":"10.1016\/j.asoc.2018.12.029"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"J. Meira, R. Andrade, I. Pra\u00e7a, J. Carneiro, V. Bol\u00f3n-Canedo, A. Alonso-Betanzos, G. Marreiros, Performance evaluation of unsupervised techniques in cyber-attack anomaly detection, Journal of Ambient Intelligence and Humanized Computing 11. https:\/\/doi.org\/10.1007\/s12652-019-01417-9","DOI":"10.1007\/s12652-019-01417-9"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"S. K. Shandilya, S. Upadhyay, A. Kumar, A. Nagar, Ai-assisted computer network operations testbed for nature-inspired cyber security based adaptive defense simulation and analysis, Future Generation Computer Systems 127. https:\/\/doi.org\/10.1016\/j.future.2021.09.018","DOI":"10.1016\/j.future.2021.09.018"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"S. Omar, M. Ngadi, H. Jebur, S. Benqdara, Machine learning techniques for anomaly detection an overview, International Journal of Computer Applications 79. https:\/\/doi.org\/10.5120\/13715-1478","DOI":"10.5120\/13715-1478"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"M. Atighetchi, P. Pal, F. Webber, C. Jones, Adaptive use of network-centric mechanisms in cyber-defense., 2003, pp. 179-. https:\/\/doi.org\/10.1109\/ISORC.2003.1199253","DOI":"10.1109\/ISORC.2003.1199253"},{"key":"5_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107901","volume":"100","author":"H Bangui","year":"2022","unstructured":"Bangui, H., Buhnova, B.: Lightweight intrusion detection for edge computing networks using deep forest and bioinspired algorithms. Comput. Electr. Eng. 100, 107901 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3390\/computers8030059","volume":"8","author":"A Qureshi","year":"2019","unstructured":"Qureshi, A., Larijani, H., Mtetwa, N., Javed, A., Ahmad, J.: Rnn-abc: A new swarm optimization based technique for anomaly detection. Computers 8, 59 (2019). https:\/\/doi.org\/10.3390\/computers8030059","journal-title":"Computers"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"S. B, M. K, Firefly algorithm based feature selection for network intrusion detection, Computers and Security 81. https:\/\/doi.org\/10.1016\/j.cose.2018.11.005","DOI":"10.1016\/j.cose.2018.11.005"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"A. Alzaqebah, I. Aljarah, O. Al-Kadi, R. Damasevicius, A modified grey wolf optimization algorithm for an intrusion detection system, Mathematics 10. https:\/\/doi.org\/10.3390\/math10060999","DOI":"10.3390\/math10060999"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"M. Sharma, S. Saini, S. Bahl, R. Goyal, S. Deswal, Modified bio-inspired algorithms for intrusion detection system (2021) 185\u2013201 https:\/\/doi.org\/10.1007\/978-981-15-5113-0-14","DOI":"10.1007\/978-981-15-5113-0-14"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"O. Almomani, A hybrid model using bio-inspired metaheuristic algorithms for network intrusion detection system, Computers, Materials and Continua 68 (2021) 409\u2013429. http:\/\/dx.doi.org\/10.32604\/cmc.2021.016113","DOI":"10.32604\/cmc.2021.016113"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"M. S. Vinmathi, M. S. Josephine, e. V. E. Jeyabalaraja, V.\", V. K. Solanki, R. Kumar, Bio-inspired search optimization for intrusion detection system in cognitive wireless sensor networks (2021) 33\u201341 https:\/\/doi.org\/10.1007\/978-3-030-57835-0-4","DOI":"10.1007\/978-3-030-57835-0-4"}],"container-title":["Communications in Computer and Information Science","Applied Machine Learning and Data Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-55486-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T07:10:06Z","timestamp":1709709006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-55486-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031554858","9783031554865"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-55486-5_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"7 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. The authors declare the following financial interests\/personal relationships which may be considered as potential competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"AMLDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Machine Learning and Data Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00fcbeck","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"amlda2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icamlda.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}