{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T07:06:25Z","timestamp":1746860785740,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319029306"},{"type":"electronic","value":"9783319029313"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-02931-3_23","type":"book-chapter","created":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T10:00:13Z","timestamp":1380967213000},"page":"189-196","source":"Crossref","is-referenced-by-count":8,"title":["Comparative Study of Machine Learning Algorithm for Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"K.","family":"Sravani","sequence":"first","affiliation":[]},{"given":"P.","family":"Srinivasu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Farid, D., Harbi, N., Rahman, M.Z.: Combining Na\u00efve Bayes And Decision Tree For Adaptive Intrusion Detection. International Journal of Network Security & Its Applications (IJNSA)\u00a02(2) (April 2010)","DOI":"10.5121\/ijnsa.2010.2202"},{"issue":"2","key":"23_CR2","doi-asserted-by":"crossref","first-page":"0975","DOI":"10.5120\/892-1266","volume":"5","author":"S. Akbar","year":"2010","unstructured":"Akbar, S., Nageswara Rao, K., Chandulal, J.A.: Intrusion Detection SystemMethodologies Based on Data Analysis. International Journal of Computer Applications\u00a05(2), 0975\u20138887 (2010)","journal-title":"International Journal of Computer Applications"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Chandolikar, N.S., Nandavadekar, V.D.: Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99. MIT International Journal of Computer Science & Information Technology\u00a02(2), 85\u201390 (2012) ISSN No. 2230-7621","DOI":"10.1109\/WOCN.2012.6335546"},{"key":"23_CR4","unstructured":"Srinivasu, P., Avadhani, P.S.: Approaches and Data Processing Techniques for Intrusion Detection System. International Journal of Computer Science and Network Security\u00a09(12) (December 2009)"},{"key":"23_CR5","unstructured":"Olusola, A.A., Oladele, A.S., Abosede, D.O.: Analysis of KDD \u201999 Intrusion Detection Dataset for Selection of Relevance Features. In: Proceedings of the World Congress on Engineering and Computer Science, WCECS 2010, San Francisco, USA, October 20-22, vol.\u00a0I (2010)"},{"key":"23_CR6","unstructured":"http:\/\/www.kdd.ics.uci.edu\/databases\/kddcup99\/task.html"},{"key":"23_CR7","unstructured":"Singh, S., Silakari, S.: An ensemble approach for feature selection of Cyber Attack Dataset. International Journal of Computer Science and Information Security\u00a06(2) (2009)"},{"key":"23_CR8","unstructured":"Jain, A., Sharma, S., Sisodia, M.S.: Network Intrusion Detection by using Supervised and Unsupervised Machine Learning Technique- A Survey. IJCTEE\u00a01(3) (Deceember 2011)"},{"key":"23_CR9","unstructured":"Vinchurkar, D.P., Reshamwala, A.: A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique. IJESIT\u00a01(2) (November 2012)"},{"issue":"6","key":"23_CR10","first-page":"1825","volume":"5","author":"H. Tang","year":"2009","unstructured":"Tang, H., Cad, Z.: Machine Learning-based Intrusion Detection Algorithms. Journal of Computational Information Systems 5(6), 1825\u20131831 (2009)","journal-title":"Journal of Computational Information Systems"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02931-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T14:11:10Z","timestamp":1674137470000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-02931-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319029306","9783319029313"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02931-3_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}