{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:53:38Z","timestamp":1768589618903,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031751691","type":"print"},{"value":"9783031751707","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75170-7_21","type":"book-chapter","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T17:37:34Z","timestamp":1734543454000},"page":"282-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Approach to Solve Network Security, Cryptography Problems Using Genetic Algorithm"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6413-0777","authenticated-orcid":false,"given":"Devasenathipathi N.","family":"Mudaliar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1763-9893","authenticated-orcid":false,"given":"Nilesh","family":"Modi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1113-5784","authenticated-orcid":false,"given":"Jyotindra","family":"Dharwa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Haq, E., et al.: A novel selection approach for genetic algorithms for global optimization of multimodal continuous functions. Comput. Intell. Neurosci. 2019, 1\u201314 (2019)","DOI":"10.1155\/2019\/8640218"},{"issue":"1","key":"21_CR2","first-page":"283","volume":"26","author":"J Kaabi","year":"2019","unstructured":"Kaabi, J., Harrath, Y.: Permutation rules and genetic algorithm to solve the traveling salesman problem. Arab J. Basic Appl. Sci. 26(1), 283\u2013291 (2019)","journal-title":"Arab J. Basic Appl. Sci."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Falih, A., Shammari, A.Z.: Hybrid constrained permutation algorithm and genetic algorithm for process planning problem. J. Intell. Manuf. 31, 1079\u20131099 (2020)","DOI":"10.1007\/s10845-019-01496-7"},{"key":"21_CR4","unstructured":"Bassin, A., Buzdalov, M.: The (1+(\u03bb, \u03bb)) genetic algorithm for permutations. In: Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion (2020)"},{"issue":"4","key":"21_CR5","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1162\/evco.1996.4.4.361","volume":"4","author":"T Blickle","year":"1996","unstructured":"Blickle, T., Thiele, L.: A comparison of selection schemes used in evolutionary algorithms. Evol. Comput. 4(4), 361\u2013394 (1996)","journal-title":"Evol. Comput."},{"issue":"19","key":"21_CR6","first-page":"7669","volume":"217","author":"M Kaya","year":"2011","unstructured":"Kaya, M.: The effects of a new selection operator on the performance of a genetic algorithm. Appl. Math. Comput. 217(19), 7669\u20137678 (2011)","journal-title":"Appl. Math. Comput."},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Hussain, A., Muhammad, Y.S.: Trade-off between exploration and exploitation with genetic algorithm using a novel selection operator. Complex Intell. Syst. 6(1), 1\u201314 (2020)","DOI":"10.1007\/s40747-019-0102-7"},{"issue":"4","key":"21_CR8","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/4235.797972","volume":"3","author":"A Rogers","year":"1999","unstructured":"Rogers, A., Prugel-Bennett, A.: Genetic drift in genetic algorithm selection schemes. IEEE Trans. Evol. Comput. 3(4), 298\u2013303 (1999)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Jannoud, Ismael, et al. \u201cThe role of genetic algorithm selection operators in extending WSN stability period: a comparative study.\u201c Electronics 11.1 (2021): 28","DOI":"10.3390\/electronics11010028"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Kuo, T., Hwang, S.-Y. A genetic algorithm with disruptive selection. IEEE Trans. Syst. Man, Cybernetics, Part B (Cybern.) 26(2), 299\u2013307 (1996)","DOI":"10.1109\/3477.485880"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Smith, J.E., Fogarty, T.C.: Operator and parameter adaptation in genetic algorithms. Soft Comput. 1, 81\u201387 (1997)","DOI":"10.1007\/s005000050009"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Xue, Y., et al.: Adaptive crossover operator based multi-objective binary genetic algorithm for feature selection in classification. Knowl.-Based Syst. 227, 107218 (2021)","DOI":"10.1016\/j.knosys.2021.107218"},{"key":"21_CR13","unstructured":"Pencheva, T., Atanassov, K., Shannon, A.: Modelling of a roulette wheel selection operator in genetic algorithms using generalized nets. Int. J. Bioautom. 13(4), 257 (2009)"},{"key":"21_CR14","unstructured":"Alhijawi, B., Arafat, A.: Genetic algorithms: theory, genetic operators, solutions, and applications. Evol. Intell. 1\u201312 (2023)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Goswami, R.D., Chakraborty, S., Misra, B.: Variants of genetic algorithms and their applications. In: Applied Genetic Algorithm and its Variants: Case Studies and New Developments. Singapore: Springer Nature Singapore, pp. 1\u201320 (2020)","DOI":"10.1007\/978-981-99-3428-7_1"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Song, Y., et al.: RL-GA: a reinforcement learning-based genetic algorithm for electromagnetic detection satellite scheduling problem. Swarm Evolut. Comput. 77, 101236 (2023)","DOI":"10.1016\/j.swevo.2023.101236"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Sun, K., et al.: Hybrid genetic algorithm with variable neighborhood search for flexible job shop scheduling problem in a machining system. Expert Syst. Appl. 215, 119359 (2023)","DOI":"10.1016\/j.eswa.2022.119359"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Cui, J., Zhou, Y., Huang, G.: A test paper generation algorithm based on diseased enhanced genetic algorithm. Heliyon (2023)","DOI":"10.1016\/j.heliyon.2023.e17187"},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.aej.2023.11.013","volume":"85","author":"A Fahim","year":"2023","unstructured":"Fahim, A., Raslan, Y.: Optimized steganography techniques based on PVDS and genetic algorithm. Alex. Eng. J. 85, 245\u2013260 (2023)","journal-title":"Alex. Eng. J."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Akhtar, M.A., et al.: Robust genetic machine learning ensemble model for intrusion detection in network traffic. Sci. Rep. 13(1), 17227 (2023)","DOI":"10.1038\/s41598-023-43816-1"},{"issue":"23","key":"21_CR21","doi-asserted-by":"publisher","first-page":"12755","DOI":"10.3390\/app132312755","volume":"13","author":"K Alzboon","year":"2023","unstructured":"Alzboon, K., Al-Nihoud, J., Alsharafat, W.: Novel network intrusion detection based on feature filtering using FLAME and new cuckoo selection in a genetic algorithm. Appl. Sci. 13(23), 12755 (2023)","journal-title":"Appl. Sci."}],"container-title":["Communications in Computer and Information Science","Computing Science, Communication and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75170-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T18:10:42Z","timestamp":1734545442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75170-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"ISBN":["9783031751691","9783031751707"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75170-7_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"19 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMS2","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computing Science, Communication and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gujarat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coms22024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}