{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:16Z","timestamp":1761611356442},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_15","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T19:24:31Z","timestamp":1402428271000},"page":"145-154","source":"Crossref","is-referenced-by-count":2,"title":["Multi-agent Artificial Immune System for Network Intrusion Detection and Classification"],"prefix":"10.1007","author":[{"given":"Amira Sayed A.","family":"Aziz","sequence":"first","affiliation":[]},{"given":"Sanaa El-Ola","family":"Hanafi","sequence":"additional","affiliation":[]},{"given":"Aboul Ella","family":"Hassanien","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.1016\/j.asoc.2010.08.024","volume":"11","author":"D. Dasgupta","year":"2011","unstructured":"Dasgupta, D., Yu, S., Nino, F.: Advances in artificial immune systems: Models and applications. Applied Soft Computing\u00a011(2), 1574\u20131587 (2011)","journal-title":"Applied Soft Computing"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-540-30220-9_26","volume-title":"Artificial Immune Systems","author":"U. Aickelin","year":"2004","unstructured":"Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection - a review. In: Artificial Immune Systems, pp. 316\u2013329. Springer, Heidelberg (2004)"},{"issue":"3","key":"15_CR3","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/IDA-2005-9306","volume":"9","author":"T.M. Khoshgoftaar","year":"2005","unstructured":"Khoshgoftaar, T.M., Gao, K., Ibrahim, N.H.: Evaluating indirect and direct classification techniques for network intrusion detection. Intelligent Data Analysis\u00a09(3), 309\u2013326 (2005)","journal-title":"Intelligent Data Analysis"},{"issue":"3","key":"15_CR4","first-page":"249","volume":"31","author":"S.B. Kotsiantis","year":"2007","unstructured":"Kotsiantis, S.B.: Supervised machine learning: A review of classification techniques. Informatica (03505596)\u00a031(3), 249\u2013268 (2007)","journal-title":"Informatica (03505596)"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.inffus.2013.04.006","volume":"16","author":"M. Wozniak","year":"2014","unstructured":"Wozniak, M., Grana, M., Corchado, E.: A survey of multiple classifier systems as hybrid systems. Information Fusion\u00a016, 3\u201317 (2014)","journal-title":"Information Fusion"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.neucom.2013.01.055","volume":"126","author":"J.L. Calvo-Rolle","year":"2014","unstructured":"Calvo-Rolle, J.L., Corchado, E.: A bio-inspired knowledge system for improving combined cycle plant control tuning. Neurocomputing\u00a0126, 95\u2013105 (2014)","journal-title":"Neurocomputing"},{"key":"15_CR7","unstructured":"Zhang, H.: The optimality of naive bayes. In: Proceedings of the FLAIRS Conference, vol.\u00a01, pp. 3\u20139 (2004)"},{"issue":"18","key":"15_CR8","doi-asserted-by":"publisher","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","volume":"39","author":"L. Koc","year":"2012","unstructured":"Koc, L., Mazzuchi, T.A., Sarkani, S.: A network intrusion detection system based on a hidden nave bayes multiclass classifier. Original Research Article Expert Systems with Applications\u00a039(18), 13492\u201313500 (2012)","journal-title":"Original Research Article Expert Systems with Applications"},{"key":"15_CR9","unstructured":"Shi, H.: Best-first decision tree learning. Phd dissertation, The University of Waikato (2007)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-45248-5_10","volume-title":"Recent Advances in Intrusion Detection","author":"C. Kruegel","year":"2003","unstructured":"Kruegel, C., T\u00f3th, T.: Using decision trees to improve signature-based intrusion detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 173\u2013191. Springer, Heidelberg (2003)"},{"key":"15_CR11","unstructured":"Mitchell, T.M.: Machine learning. McGraw Hill (1997) ISBN-10: 0070428077"},{"key":"15_CR12","unstructured":"Anderson, J.R.: Machine learning: An artificial intelligence approach. Morgan Kaufmann (1986) ISBN-10: 0934613095"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Caruana, R., Niculescu-mizil, A.: An empirical comparison of supervised learning algorithms. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 161\u2013168. ACM (2006)","DOI":"10.1145\/1143844.1143865"},{"key":"15_CR14","unstructured":"Damgaard, C.: Gini coefficient, \n                  \n                    http:\/\/mathworld.wolfram.com\/GiniCoefficient.html"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Aziz, A.S.A., Azar, A.T., Hassanien, A.E., Hanafy, S.E.O.: Continuous features discretization for anomaly intrusion detectors generation. In: Soft Computing in Industrial Applications, pp. 209\u2013221. Springer International Publishing (2014)","DOI":"10.1007\/978-3-319-00930-8_19"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Aha, D.W., Bankert, R.L.: A comparative evaluation of sequential feature selection algorithms. In: Learning from Data, pp. 199\u2013206. Springer New York (1996)","DOI":"10.1007\/978-1-4612-2404-4_19"},{"key":"15_CR17","unstructured":"Aziz, A.S.A., Azar, A.T., Hassanien, A.E., Hanafy, S.E.O.: Genetic algorithm with different feature selection techniques for anomaly detectors generation. In: 2013 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 769\u2013774. IEEE (2013)"},{"key":"15_CR18","unstructured":"Weka 3: Data mining software in java, \n                  \n                    http:\/\/www.cs.waikato.ac.nz\/~ml\/weka\/"},{"key":"15_CR19","unstructured":"Nsl-kdd intrusion detection data set (March 2009), \n                  \n                    http:\/\/iscx.ca\/NSL-KDD\/"},{"key":"15_CR20","unstructured":"Kdd cup\u201999 intrusion detection data set (October 2007), \n                  \n                    http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Aziz, A.S.A., Hassanien, A.E., Hanafy, S.E.O., Tolba, M.F.: Multi-layer hybrid machine learning techniques for anomalies detection and classification approach. In: 13th International Conference on Hybrid Intelligent Systems (HIS), pp. 216\u2013221. IEEE (2013)","DOI":"10.1109\/HIS.2013.6920485"},{"key":"15_CR22","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-642-40597-6_19","volume-title":"Advances in Security of Information and Communication Networks","author":"A.S. Abdel-Aziz","year":"2013","unstructured":"Abdel-Aziz, A.S., Hassanien, A.E., Azar, A.T., Hanafi, S.E.-O.: Machine learning techniques for anomalies detection and classification. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds.) SecNet 2013. CCIS, vol.\u00a0381, pp. 219\u2013229. Springer, Heidelberg (2013)"},{"key":"15_CR23","unstructured":"Java agent development framework (December 2013), \n                  \n                    http:\/\/jade.tilab.com"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Bellifemine, F., Poggi, A., Rimassa, G.: Developing multi-agent systems with a fipa-compliant agent framework. Software-Practice and Experience (2001)","DOI":"10.1007\/3-540-44631-1_7"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:03:50Z","timestamp":1558904630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}