{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:14:27Z","timestamp":1725772467438},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319054575"},{"type":"electronic","value":"9783319054582"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05458-2_42","type":"book-chapter","created":{"date-parts":[[2014,2,28]],"date-time":"2014-02-28T10:28:36Z","timestamp":1393583316000},"page":"403-413","source":"Crossref","is-referenced-by-count":1,"title":["A Filter Based Feature Selection Approach in MSVM Using DCA and Its Application in Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Hoai An","family":"Le Thi","sequence":"first","affiliation":[]},{"given":"Anh Vu","family":"Le","sequence":"additional","affiliation":[]},{"given":"Xuan Thanh","family":"Vo","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Zidna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"KDD Cup 1999 data set (1999), \n                    \n                      http:\/\/www.sigkdd.org\/kddcup\/index.php?section=1999&method=data"},{"issue":"1","key":"42_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/S0377-2217(00)00097-7","volume":"131","author":"C.-T. Chang","year":"2001","unstructured":"Chang, C.-T.: On the polynomial mixed 0-1 fractional programming problems. European Journal of Operational Research\u00a0131(1), 224\u2013227 (2001)","journal-title":"European Journal of Operational Research"},{"key":"42_CR3","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1016\/S0377-2217(99)00106-X","volume":"123","author":"C.-T. Chang","year":"2000","unstructured":"Chang, C.-T.: An efficient linearization approach for mixed integer problems. European Journal of Operational Research\u00a0123, 652\u2013659 (2000)","journal-title":"European Journal of Operational Research"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., Franke, K., Petrovic, S.: Towards a generic feature-selection measure for intrusion detection. In: International Conference Pattern Recognition, pp. 1529\u20131532 (2010)","DOI":"10.1109\/ICPR.2010.378"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., Franke, K., Petrovic, S.: Reliability in a feature-selection process for intrusion detection. In: Dai, H., Liu, J.N.K., Smirnov, E. (eds.) Reliable Knowledge Discovery, pp. 203\u2013218. Springer US (2012)","DOI":"10.1007\/978-1-4614-1903-7_11"},{"key":"42_CR6","unstructured":"Hall, M.: Correlation Based Feature Selection for Machine Learning. Doctoral Dissertation, University of Waikato, Department of Computer Science (1999)"},{"key":"42_CR7","unstructured":"Le Thi, H.A.: DC Programming and DCA, \n                    \n                      http:\/\/lita.sciences.univ-metz.fr\/~lethi"},{"issue":"2","key":"42_CR8","first-page":"169","volume":"27","author":"H.A. Thi Le","year":"1999","unstructured":"Le Thi, H.A., Pham Dinh, T., Le, D.M.: Exact penalty in DC programming. Vietnam Journal of Mathematics\u00a027(2), 169\u2013178 (1999)","journal-title":"Vietnam Journal of Mathematics"},{"key":"42_CR9","series-title":"SCI","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-319-00293-4_4","volume-title":"Advanced Computational Methods for Knowledge Engineering","author":"H.A. Thi Le","year":"2013","unstructured":"Le Thi, H.A., Nguyen, M.C.: Efficient Algorithms for Feature Selection in Multi-class Support Vector Machine. In: Nguyen, N.T., van Do, T., Thi, H.A. (eds.) ICCSAMA 2013. SCI, vol.\u00a0479, pp. 41\u201352. Springer, Heidelberg (2013)"},{"key":"42_CR10","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/978-3-642-34630-9_55","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"A.V. Le","year":"2012","unstructured":"Le, A.V., Le Thi, H.A., Nguyen, M.C., Zidna, A.: Network Intrusion Detection Based on Multi-Class Support Vector Machine. In: Nguyen, N.-T., Hoang, K., J\u0119drzejowicz, P. (eds.) ICCCI 2012, Part I. LNCS (LNAI), vol.\u00a07653, pp. 536\u2013543. Springer, Heidelberg (2012)"},{"issue":"3","key":"42_CR11","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s10898-011-9765-3","volume":"52","author":"H.A. Thi Le","year":"2012","unstructured":"Le Thi, H.A., Pham Dinh, T., Huynh, V.N.: Exact penalty and Error Bounds in DC programming. Journal of Global Optimization\u00a052(3), 509\u2013535 (2012)","journal-title":"Journal of Global Optimization"},{"key":"42_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11937807_13","volume-title":"Information Security and Cryptology","author":"Y. Chen","year":"2006","unstructured":"Chen, Y., Li, Y., Cheng, X.-Q., Guo, L.: Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol.\u00a04318, pp. 153\u2013167. Springer, Heidelberg (2006)"},{"issue":"8","key":"42_CR13","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H. Peng","year":"2005","unstructured":"Peng, H., Long, F., Ding, C.H.Q.: Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a027(8), 1226\u20131238 (2005)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"42_CR14","first-page":"289","volume":"22","author":"T. Pham Dinh","year":"1997","unstructured":"Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to dc programming: Theory, algorithms and applications. Acta Mathematica Vietnamica\u00a022(1), 289\u2013357 (1997)","journal-title":"Acta Mathematica Vietnamica"},{"key":"42_CR15","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1137\/S1052623494274313","volume":"8","author":"T. Pham Dinh","year":"1998","unstructured":"Pham Dinh, T., Le Thi, H.A.: Dc optimization algorithms for solving the trust region subproblem. SIAM J. Optimization\u00a08, 476\u2013505 (1998)","journal-title":"SIAM J. Optimization"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Pham Dinh, T., Le Thi, H.A.: Recent advances on DC programming and DCA. To appear in Transactions on Computational Collective Intelligence, 37 pages. Springer (2013)","DOI":"10.1007\/978-3-642-54455-2_1"},{"key":"42_CR17","unstructured":"Weston, J., Watkins, C.: Support Vector Machines for Multi-Class Pattern Recognition. In: Proceedings - European Symposium on Artificial Neural Networks, ESANN 1999, pp. 219\u2013224. D-Facto public (1999)"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Le Thi, H.A., Pham Dinh, T.: DC programming in Communication Systems: challenging problems and methods. Vietnam Journal of Computer Science, invited issue, 21 pages (2013), doi:10.1007\/s40595-013-0010-5","DOI":"10.1007\/s40595-013-0010-5"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05458-2_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T10:26:54Z","timestamp":1558866414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-05458-2_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319054575","9783319054582"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05458-2_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}