{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T08:47:17Z","timestamp":1749804437704,"version":"3.40.4"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086231"},{"type":"electronic","value":"9783319086248"}],"license":[{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-08624-8_8","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T13:40:10Z","timestamp":1409751610000},"page":"173-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks"],"prefix":"10.1007","author":[{"given":"Gulshan","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Krishan","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,4]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abraham, A., Thomas, J.: Distributed intrusion detection systems: a computational intelligence approach. Applications of Information Systems to Homeland Security and Defense, pp. 105\u2013135. Idea Group Inc., Publishers, USA (2005)","DOI":"10.4018\/978-1-59140-640-2.ch005"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Ahmadian, K., Golestani, A., Analoui, M., Jahed, M.: Evolving ensemble of classifiers in low-dimensional spaces using multi-objective evolutionary approach. In: Proceedings of 6th IEEE\/ACIS International Conference on Computer and Information Science (ICIS), pp. 217\u2013222. IEEE (2007)","DOI":"10.1109\/ICIS.2007.98"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Ahmadian, K., Golestani, A., Mozayani, N., Kabiri, P.: A new multi-objective evolutionary approach for creating ensemble of classifiers. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics (ISIC), pp. 1031\u20131036. IEEE (2007)","DOI":"10.1109\/ICSMC.2007.4413723"},{"key":"8_CR4","unstructured":"Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Technical report (2000)"},{"key":"8_CR5","unstructured":"Bishop, C.: Pattern Recognition and Machine Learning, vol. 4. Springer, New York (2006)"},{"key":"8_CR6","unstructured":"Breiman, L.: Bias, variance, and arcing classifiers (technical report 460). Department of statistics. University of California at Berkeley (1996)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Brown, C., Cowperthwaite, A., Hijazi, A., Somayaji, A.: Analysis of the 1999 darpa\/lincoln laboratory ids evaluation data with netadhict. In: Proceedings of IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp. 1\u20137. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356522"},{"key":"8_CR8","unstructured":"Brugger, S.: Data mining methods for network intrusion detection. University of California at Davis (2004). www.citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.88.3127&rep=rep1&type=pdf"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR10","unstructured":"Chawla, N.: C4. 5 and imbalanced data sets: investigating the effect of sampling method, probabilistic estimate, and decision tree structure. In: Proceedings of the ICML Workshop on Learning from Imbalanced Datasets II, vol. 3 (2003)"},{"issue":"4","key":"8_CR11","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., Thomas, J.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295\u2013307 (2005)","journal-title":"Comput. Secur."},{"issue":"4","key":"8_CR12","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1002\/int.20203","volume":"22","author":"Y Chen","year":"2007","unstructured":"Chen, Y., Abraham, A., Yang, B.: Hybrid flexible neural-tree-based intrusion detection systems. Int. J. Intell. Syst. 22(4), 337\u2013352 (2007)","journal-title":"Int. J. Intell. Syst."},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/358923.358929","volume":"32","author":"C Coello","year":"2000","unstructured":"Coello, C.: An updated survey of ga-based multiobjective optimization techniques. ACM Comput. Surv. (CSUR) 32(2), 109\u2013143 (2000)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"8_CR14","first-page":"129","volume":"1","author":"C Coello","year":"1999","unstructured":"Coello, C., et al.: A comprehensive survey of evolutionary-based multiobjective optimization techniques. Knowl. Inf. syst. 1(3), 129\u2013156 (1999)","journal-title":"Knowl. Inf. syst."},{"key":"8_CR15","unstructured":"Corne, D., Jerram, N., Knowles, J., Oates, M., et al.: Pesa-ii: Region-based selection in evolutionary multiobjective optimization. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO\u20192001). Citeseer (2001)"},{"key":"8_CR16","unstructured":"Deb, K.: Multi-objective optimization. Multi-objective Optimization using Evolutionary Algorithms, pp. 13\u201346. Wiley, New York (2001)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1007\/3-540-45356-3_83","volume":"1917","author":"K Deb","year":"2000","unstructured":"Deb, K., Agrawal, S., Pratap, A., Meyarivan, T.: A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: Nsga-ii. Lect. Notes Comput. Sci. 1917, 849\u2013858 (2000)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1162\/106365602760972767","volume":"10","author":"K Deb","year":"2002","unstructured":"Deb, K., Anand, A., Joshi, D.: A computationally efficient evolutionary algorithm for real-parameter optimization. Evol. Comput. 10(4), 371\u2013395 (2002)","journal-title":"Evol. Comput."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Dietterich, T.: Ensemble methods in machine learning. Multiple Classifier Systems, pp. 1\u201315. Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-45014-9_1"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Dietterich, T., Bakiri, G.: Error-correcting output codes: a general method for improving multiclass inductive learning programs. In: Proceedings of Santa fe Institute Studies in the Sciences of Complexity, vol. 20, pp. 395\u2013395. Citeseer (1994)","DOI":"10.1201\/9780429492525-14"},{"key":"8_CR21","unstructured":"Dos Santos, E.M.: Static and dynamic overproduction and selection of classifier ensembles with genetic algorithms. Ph.D. thesis, Montreal (2008)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Engen, V.: Machine learning for network based intrusion detection: an investigation into discrepancies in findings with the kdd cup\u201999 data set and multi-objective evolution of neural network classifier ensembles from imbalanced data. Ph.D. thesis, Bournemouth University (2010)","DOI":"10.1109\/ICMLC.2009.5212485"},{"issue":"8","key":"8_CR23","doi-asserted-by":"publisher","first-page":"7411","DOI":"10.1016\/j.eswa.2012.01.065","volume":"39","author":"K Fung","year":"2012","unstructured":"Fung, K., Kwong, C., Siu, K., Yu, K.: A multi-objective genetic algorithm approach to rule mining for affective product design. Expert Syst. Appl. 39(8), 7411\u20137419 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"8_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0167-8655(00)00096-9","volume":"22","author":"G Giacinto","year":"2001","unstructured":"Giacinto, G., Roli, F.: An approach to the automatic design of multiple classifier systems. Pattern Recogn. Lett. 22(1), 25\u201333 (2001)","journal-title":"Pattern Recogn. Lett."},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Giannopoulos, N., Moulianitis, V., Nearchou, A.: Multi-objective optimization with fuzzy measures and its application to flow-shop scheduling. Eng. Appl. Artif. Intell. 25, 1381\u20131394 (2012)","DOI":"10.1016\/j.engappai.2012.06.011"},{"issue":"8","key":"8_CR26","doi-asserted-by":"publisher","first-page":"1662","DOI":"10.1016\/j.comnet.2010.12.008","volume":"55","author":"M Govindarajan","year":"2011","unstructured":"Govindarajan, M., Chandrasekaran, R.: Intrusion detection using neural based hybrid classification methods. Comput. Netw. 55(8), 1662\u20131671 (2011)","journal-title":"Comput. Netw."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Gu, G., Fogla, P., Dagon, D., Lee, W., Skori\u0107, B.: Measuring intrusion detection capability: An information-theoretic approach. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 90\u2013101. ACM (2006)","DOI":"10.1145\/1128817.1128834"},{"issue":"8","key":"8_CR28","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1016\/j.patcog.2008.01.022","volume":"41","author":"R Hu","year":"2008","unstructured":"Hu, R., Damper, R.: A no panacea theorem for classifier combination. Pattern Recogn. 41(8), 2665\u20132673 (2008)","journal-title":"Pattern Recogn."},{"issue":"3","key":"8_CR29","first-page":"129","volume":"3","author":"H Ishibuchi","year":"2006","unstructured":"Ishibuchi, H., Nojima, Y.: Evolutionary multiobjective optimization for the design of fuzzy rule-based ensemble classifiers. Int. J. Hybrid Intell. Syst. 3(3), 129\u2013145 (2006)","journal-title":"Int. J. Hybrid Intell. Syst."},{"issue":"1","key":"8_CR30","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/34.824819","volume":"22","author":"A Jain","year":"2000","unstructured":"Jain, A., Duin, R., Mao, J.: Statistical pattern recognition: a review. IEEE Trans. Pattern Anal. Mach. Intell. 22(1), 4\u201337 (2000). doi:10.1109\/34.824819","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"8_CR31","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1007730.1007737","volume":"6","author":"T Jo","year":"2004","unstructured":"Jo, T., Japkowicz, N.: Class imbalances versus small disjuncts. ACM SIGKDD Explor. Newsl. 6(1), 40\u201349 (2004)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"8_CR32","unstructured":"KDD: Kdd cup 1999 dataset (1999). http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"issue":"8","key":"8_CR33","doi-asserted-by":"publisher","first-page":"2732","DOI":"10.1016\/j.patcog.2010.03.006","volume":"43","author":"W Khreich","year":"2010","unstructured":"Khreich, W., Granger, E., Miri, A., Sabourin, R.: Iterative boolean combination of classifiers in the roc space: an application to anomaly detection with hmms. Pattern Recogn. 43(8), 2732\u20132752 (2010)","journal-title":"Pattern Recogn."},{"issue":"1","key":"8_CR34","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.patcog.2011.06.014","volume":"45","author":"W Khreich","year":"2012","unstructured":"Khreich, W., Granger, E., Miri, A., Sabourin, R.: Adaptive roc-based ensembles of hmms applied to anomaly detection. Pattern Recogn. 45(1), 208\u2013230 (2012)","journal-title":"Pattern Recogn."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Kumar, G., Kumar, K.: Ai based supervised classifiers: an analysis for intrusion detection. In: Proceedings of International Conference on Advances in Computing and Artificial Intelligence, pp. 170\u2013174. ACM (2011)","DOI":"10.1145\/2007052.2007087"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Kumar, G., Kumar, K.: A novel evaluation function for feature selection based upon information theory. In: Proceedings of 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 000,395\u2013000,399. IEEE (2011)","DOI":"10.1109\/CCECE.2011.6030480"},{"issue":"2","key":"8_CR37","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1002\/sec.303","volume":"5","author":"G Kumar","year":"2012","unstructured":"Kumar, G., Kumar, K.: An information theoretic approach for feature selection. Secur. Commun. Networks 5(2), 178\u2013185 (2012). doi:10.1002\/sec.303","journal-title":"Secur. Commun. Networks"},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/850160","volume":"2012","author":"G Kumar","year":"2012","unstructured":"Kumar, G., Kumar, K.: The use of artificial-intelligence-based ensembles for intrusion detection: a review. Appl. Comput. Intell. Soft Comput. 2012, 1\u201320 (2012). doi:10.1155\/2012\/850160","journal-title":"Appl. Comput. Intell. Soft Comput."},{"issue":"24","key":"8_CR39","doi-asserted-by":"publisher","first-page":"115","DOI":"10.4236\/ijis.2012.224016","volume":"2","author":"G Kumar","year":"2012","unstructured":"Kumar, G., Kumar, K.: The use of multi-objective genetic algorithm based approach to create ensemble of ann for intrusion detection. Int. J. Intell. Sci. 2(24), 115\u2013127 (2012). doi:10.4236\/ijis.2012.224016","journal-title":"Int. J. Intell. Sci."},{"issue":"1","key":"8_CR40","first-page":"44","volume":"1","author":"G Kumar","year":"2010","unstructured":"Kumar, G., Kumar, K., Sachdeva, M.: An empirical comparative analysis of feature reduction methods for intrusion detection. Int. J. Inf. Telecommun. Technol. 1(1), 44\u201351 (2010)","journal-title":"Int. J. Inf. Telecommun. Technol."},{"issue":"4","key":"8_CR41","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10462-010-9179-5","volume":"34","author":"G Kumar","year":"2010","unstructured":"Kumar, G., Kumar, K., Sachdeva, M.: The use of artificial intelligence based techniques for intrusion detection: a review. Artif. Intell. Rev. 34(4), 369\u2013387 (2010)","journal-title":"Artif. Intell. Rev."},{"issue":"3","key":"8_CR42","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1109\/TNN.2007.897478","volume":"18","author":"LI Kuncheva","year":"2007","unstructured":"Kuncheva, L.I.: Combining pattern classifiers: methods and algorithms (kuncheva, li; 2004)[bibbookreview]. IEEE Trans. Neural Netw. 18(3), 964\u2013964 (2007)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"6","key":"8_CR43","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W Lee","year":"2000","unstructured":"Lee, W., Stolfo, S., Mok, K.: Adaptive intrusion detection: a data mining approach. Artif. Intell. Rev. 14(6), 533\u2013567 (2000)","journal-title":"Artif. Intell. Rev."},{"issue":"4","key":"8_CR44","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262\u2013294 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"3","key":"8_CR45","doi-asserted-by":"publisher","first-page":"648","DOI":"10.3923\/itj.2011.648.655","volume":"10","author":"Z Muda","year":"2011","unstructured":"Muda, Z., Yassin, W., Sulaiman, M., Udzir, N., et al.: A k-means and naive bayes learning approach for better intrusion detection. Inf. Technol. J. 10(3), 648\u2013655 (2011)","journal-title":"Inf. Technol. J."},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Parrott, D., Li, X., Ciesielski, V.: Multi-objective techniques in genetic programming for evolving classifiers. In: Proceedings of IEEE Congress on Evolutionary Computation, vol. 2, pp. 1141\u20131148. IEEE (2005)","DOI":"10.1109\/CEC.2005.1554819"},{"key":"8_CR47","doi-asserted-by":"publisher","unstructured":"Patcha, A., Park, J.M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448\u20133470 (2007). doi:10.1016\/j.comnet.2007.02.001. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S138912860700062X","DOI":"10.1016\/j.comnet.2007.02.001"},{"issue":"4","key":"8_CR48","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.engappai.2006.01.003","volume":"19","author":"R Perdisci","year":"2006","unstructured":"Perdisci, R., Giacinto, G., Roli, F.: Alarm clustering for intrusion detection systems in computer networks. Eng. Appl. Artif. Intell. 19(4), 429\u2013438 (2006)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"7\u20139","key":"8_CR49","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1016\/j.neucom.2009.12.012","volume":"73","author":"M Re","year":"2010","unstructured":"Re, M., Valentini, G.: Integration of heterogeneous data sources for gene function prediction using decision templates and ensembles of learning machines. Neurocomputing 73(7\u20139), 1533\u20131537 (2010)","journal-title":"Neurocomputing"},{"key":"8_CR50","unstructured":"Sabhnani, M., Serpen, G.: Application of machine learning algorithms to kdd intrusion detection dataset within misuse detection context. In: Proceedings of International Conference on Machine Learning: Models, Technologies, and Applications, vol. 1, pp. 2009\u2013215 (2003)"},{"issue":"3","key":"8_CR51","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"key":"8_CR52","unstructured":"Tavallaee, M.: An adaptive hybrid intrusion detection system. Ph.D. thesis, University of new brunswick (2011)"},{"key":"8_CR53","unstructured":"Tiwari, S.: Development and integration of geometric and optimization algorithms for packing and layout design. Ph.D. thesis, Clemson University (2009)"},{"issue":"4","key":"8_CR54","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1080\/0305215X.2010.491549","volume":"43","author":"S Tiwari","year":"2011","unstructured":"Tiwari, S., Fadel, G., Deb, K.: Amga2: improving the performance of the archive-based micro-genetic algorithm for multi-objective optimization. Eng. Optim. 43(4), 377\u2013401 (2011)","journal-title":"Eng. Optim."},{"key":"8_CR55","doi-asserted-by":"crossref","unstructured":"Tiwari, S., Koch, P., Fadel, G., Deb, K.: Amga: an archive-based micro genetic algorithm for multi-objective optimization. In: Proceedings of Genetic and Evolutionary Computation conference (GECCO-2008), Atlanta, USA, pp. 729\u2013736 (2008)","DOI":"10.1145\/1389095.1389235"},{"key":"8_CR56","doi-asserted-by":"publisher","unstructured":"Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput. Commun. 30(10), 2201\u20132212 (2007). doi:10.1016\/j.comcom.2007.05.002. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0140366407001855","DOI":"10.1016\/j.comcom.2007.05.002"},{"issue":"6","key":"8_CR57","doi-asserted-by":"crossref","first-page":"511","DOI":"10.3233\/IDA-2005-9602","volume":"9","author":"G Tsoumakas","year":"2005","unstructured":"Tsoumakas, G., Angelis, L., Vlahavas, I.: Selective fusion of heterogeneous classifiers. Intell. Data Anal. 9(6), 511\u2013525 (2005)","journal-title":"Intell. Data Anal."},{"issue":"9","key":"8_CR58","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"key":"8_CR59","unstructured":"Witten, I., Frank, E., Hall, M.: Data Mining: Practical Machine Learning Ttools and Techniques. Morgan Kaufmann, San Francisco (2011)"},{"issue":"1","key":"8_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"S Wu","year":"2010","unstructured":"Wu, S., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1\u201335 (2010)","journal-title":"Appl. Soft Comput."},{"issue":"7","key":"8_CR61","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.patrec.2008.01.008","volume":"29","author":"C Xiang","year":"2008","unstructured":"Xiang, C., Yong, P., Meng, L.: Design of multiple-level hybrid classifier for intrusion detection system using bayesian clustering and decision trees. Pattern Recogn. Lett. 29(7), 918\u2013924 (2008)","journal-title":"Pattern Recogn. Lett."},{"key":"8_CR62","first-page":"217","volume":"4","author":"A Zainal","year":"2009","unstructured":"Zainal, A., Maarof, M., Shamsuddin, S., et al.: Ensemble classifiers for network intrusion detection system. J. Inf. Assur. Secur. 4, 217\u2013225 (2009)","journal-title":"J. Inf. Assur. Secur."},{"issue":"2","key":"8_CR63","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/106365600568202","volume":"8","author":"E Zitzler","year":"2000","unstructured":"Zitzler, E., Deb, K., Thiele, L.: Comparison of multiobjective evolutionary algorithms: empirical results. Evol. Comput. 8(2), 173\u2013195 (2000)","journal-title":"Evol. Comput."}],"container-title":["Studies in Computational Intelligence","Intelligent Methods for Cyber Warfare"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08624-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:01:10Z","timestamp":1746363670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08624-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,4]]},"ISBN":["9783319086231","9783319086248"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08624-8_8","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,4]]},"assertion":[{"value":"4 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}