{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T15:10:06Z","timestamp":1746371406414,"version":"3.40.4"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112176"},{"type":"electronic","value":"9783319112183"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-11218-3_29","type":"book-chapter","created":{"date-parts":[[2014,9,8]],"date-time":"2014-09-08T11:16:15Z","timestamp":1410174975000},"page":"309-324","source":"Crossref","is-referenced-by-count":1,"title":["RBDT: The Cascading of Machine Learning Classifiers for Anomaly Detection with Case Study of Two Datasets"],"prefix":"10.1007","author":[{"given":"Goverdhan Reddy","family":"Jidiga","sequence":"first","affiliation":[]},{"given":"Porika","family":"Sammulal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An intrusion detection model. IEEE Transactions on Software Engineering (1987)","DOI":"10.1109\/SP.1986.10010"},{"key":"29_CR2","unstructured":"Axelsson, S.: Intrusion Detection Systems: A Survey and Taxonomy, Chalmers University. Technical Report 99-15 (March 2000)"},{"key":"29_CR3","unstructured":"Feng, H.H., Kolesnikov, O.M., Fogla, P., Lee, W., Gong, W.: Anomaly Detection Using Call Stack Information. In: IEEE Symposium on Security and Privacy 2003, CA, Issue Date: May 11-14, pp. 62\u201375 (2003) ISSN: 1081-6011 Print ISBN"},{"key":"29_CR4","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: 7th USENIX Security Symposium, Berkeley, CA, USA, pp. 79\u201394 (1998)"},{"key":"29_CR5","unstructured":"Lane, T., Brodley, C.E.: An Application of Machine Learning to Anomaly Detection. In: Proceedings of the 20th National Information Systems Security Conference, pp. 366\u2013377 (October 1997)"},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random Forests. Machine Learning\u00a045, 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"29_CR7","unstructured":"Jidiga, G.R., Sammulal, P.: Foundations of Intrusion Detection Systems: Focus on Role of Anomaly Detection using Machine Learning. In: ICACM - 2013 Elsevier 2nd International Conference (August 2013) ISBN No: 9789351071495"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Jidiga, G.R., Sammulal, P.: The Need of Awareness in Cyber Security with a Case Study. In: Proceedings of the 4th IEEE Conference (ICCCNT), Thiruchengode, TN, India, July 4-6 (2013)","DOI":"10.1109\/ICCCNT.2013.6726789"},{"issue":"2","key":"29_CR9","doi-asserted-by":"publisher","first-page":"119","DOI":"10.2307\/2986296","volume":"29","author":"G.V. Kass","year":"1980","unstructured":"Kass, G.V.: An Exploratory Technique for Investigating Large Quantities of Categorical Data. Applied Statistics\u00a029(2), 119\u2013127 (1980)","journal-title":"Applied Statistics"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Quinlan, J.R.: Induction of decision trees, Machine Learning 1, pp. 81\u2013106. Kluwer Publishers (1986)","DOI":"10.1007\/BF00116251"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0020-7373(87)80053-6","volume":"27","author":"J.R. Quinlan","year":"1987","unstructured":"Quinlan, J.R.: Simplifying decision trees. International Journal of Man Machine Studies\u00a027, 221\u2013234 (1987)","journal-title":"International Journal of Man Machine Studies"},{"key":"29_CR12","first-page":"305","volume-title":"Machine Intelligence","author":"J.R. Quinlan","year":"1988","unstructured":"Quinlan, J.R.: Decision Trees and Multivalued Attributes. In: Richards, J. (ed.) Machine Intelligence, vol.\u00a011, pp. 305\u2013318. Oxford Univ. Press, Oxford (1988)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Quinlan, J.R.: Unknown attribute values in induction. In: Proceedings of the Sixth International Machine Learning Workshop Cornell. Morgan Kaufmann, New York (1989)","DOI":"10.1016\/B978-1-55860-036-2.50048-5"},{"key":"29_CR14","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, Los Altos (1993)"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/0890-5401(89)90010-2","volume":"80","author":"J.R. Quinlan","year":"1989","unstructured":"Quinlan, J.R., Rivest, R.L.: Inferring Decision Trees Using The Minimum Description Length Principle. Information and Computation\u00a080, 227\u2013248 (1989)","journal-title":"Information and Computation"},{"key":"29_CR16","unstructured":"Breiman, L., Friedman, J., Olshen, R., Stone, C.: Classification and Regression Trees. Wadsworth Int. Group (1984)"},{"key":"29_CR17","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 3rd edn. Prentice-Hall (2009)"},{"key":"29_CR18","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1016\/j.eswa.2007.11.051","volume":"36","author":"K. Polat","year":"2009","unstructured":"Polat, K., G\u00fcne, S.: A novel hybrid intelligent method based on C4. 5 decision tree classifier and one against all approach for multi-class classification problems. Expert Systems with Applications\u00a036, 1587\u20131592 (2009)","journal-title":"Expert Systems with Applications"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Jiang, S., Yu, W.: A Combination Classification Algorithm Based on Outlier Detection and C4. 5. Springer Publications (2009)","DOI":"10.1007\/978-3-642-03348-3_50"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Proceedings of the Twelfth International Conference on Machine Learning Chambery, France, pp. 115\u2013123 (1993)","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Yu, M., Ai, T.H.: Study of RS data classification based on rough sets and C4. 5 algorithms. In: Proceedings of the Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series (2009)","DOI":"10.1117\/12.838637"},{"key":"29_CR22","unstructured":"Yang, X.Y.: Decision tree induction with constrained number of leaf node. Master\u2019s Thesis, National Central University (NCU-T), Taiwan (2009)"},{"key":"29_CR23","volume-title":"Data mining technique for marketing, sales and customer support","author":"J.A. Michael","year":"1997","unstructured":"Michael, J.A., Gordon, S.L.: Data mining technique for marketing, sales and customer support. Wiley, New York (1997)"},{"key":"29_CR24","first-page":"815","volume":"7","author":"W.Y. Loh","year":"1997","unstructured":"Loh, W.Y., Shih, Y.S.: Split selection methods for classification trees. Statistica Sinica\u00a07, 815\u2013840 (1997)","journal-title":"Statistica Sinica"},{"key":"29_CR25","first-page":"261","volume":"3","author":"P. Clark","year":"1989","unstructured":"Clark, P., Niblett, T.: The CN2 induction algorithm. Machine Learning\u00a03, 261\u2013283 (1989)","journal-title":"Machine Learning"},{"key":"29_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0023712","volume-title":"Machine Learning - EWSL-91","author":"P. Clark","year":"1991","unstructured":"Clark, P., Boswell, R.: Rule induction with CN2: Some recent improvements. In: Kodratoff, Y. (ed.) EWSL 1991. LNCS, vol.\u00a0482, Springer, Heidelberg (1991)"},{"key":"29_CR27","unstructured":"Rakotomalala, R., Lallich, S.: Handling noise with generalized entropy of type beta in induction graphs algorithm. In: Proceedings of International Conference on Computer Science and Informatics, pp. 25\u201327 (1998)"},{"key":"29_CR28","unstructured":"Chauchat, J.H., Rakotomalala, R., Carloz, M., Pelletier, C.: Targeting customer groups using gain and cost matrix: a marketing application. In: Proceedings of Data Mining for Marketing Applications Workshop (PKDD), pp. 1\u201313 (2001)"},{"key":"29_CR29","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-540-48247-5_66","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"R. Rakotomalala","year":"1999","unstructured":"Rakotomalala, R., Lallich, S., Di Palma, S.: Studying the behavior of generalized entropy in induction trees using a m-of-n concept. In: \u017bytkow, J.M., Rauch, J. (eds.) PKDD 1999. LNCS (LNAI), vol.\u00a01704, pp. 510\u2013517. Springer, Heidelberg (1999)"},{"key":"29_CR30","doi-asserted-by":"crossref","unstructured":"Rajeswari, P., Kannan, A.: An active rule approach for network intrusion detection with enhanced C4.5 Algorithm. International Journal of Communications Network and System Sciences, 285\u2013385 (2008)","DOI":"10.4236\/ijcns.2008.14039"},{"key":"29_CR31","unstructured":"Ghosh, A., Schwartzbard, A.: A study using NN for anomaly detection and misuse detection. Reliable Software Technologies, http:\/\/www.docshow.net\/ids\/useni"},{"key":"29_CR32","unstructured":"http:\/\/www.mathworks.in\/products\/matlab\/"},{"key":"29_CR33","unstructured":"http:\/\/eric.univ-lyon2.fr\/~ricco\/sipina.html"},{"key":"29_CR34","doi-asserted-by":"crossref","unstructured":"Benferhat, A.S., Elouedi, Z.: Naive Bayes vs Decision Trees in Intrusion Detection Systems. In: Proc. ACM Symp. Applied Computing (SAC 2004), pp. 420\u2013424 (2004)","DOI":"10.1145\/967900.967989"},{"key":"29_CR35","unstructured":"Rokach, L., Maimon, O.: Decision Trees"},{"key":"29_CR36","volume-title":"UCI Machine Learning Repository","author":"K. Bache","year":"2013","unstructured":"Bache, K., Lichman, M.: UCI Machine Learning Repository. University of California, School of Information and Computer Science, CA (2013), http:\/\/archive.ics.uci.edu\/ml"},{"key":"29_CR37","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3390\/e13010117","volume":"13","author":"I. Usta","year":"2011","unstructured":"Usta, I., Kantar, Y.M.: Mean-Variance-Skewness-Entropy Measures: A Multi-Objective Approach for Portfolio Selection. Entropy\u00a013, 117\u2013133 (2011), doi:10.3390\/e13010117","journal-title":"Entropy"},{"key":"29_CR38","unstructured":"Abdelhalim, A., Traore, I.: Converting Declarative Rules into Decision Trees. In: Proceedings of the World Congress on Engineering and Computer Science, Vol-I WCECS 2009, San Francisco, USA, October 20-22 (2009)"},{"key":"29_CR39","doi-asserted-by":"crossref","unstructured":"Abdelhalim, A.: Issa Traore, The RBDT-1 method for rule-based decision tree generation. Technical report (ECE-09-1), University of Victoria, STN CSC, Victoria, BC, Canada (July 2009)","DOI":"10.1007\/978-3-642-04985-9_12"},{"key":"29_CR40","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","author":"S. Siva","year":"2011","unstructured":"Siva, S., Sindhu, S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Elsevier-Expert Systems with Applications\u00a039, 129\u2013141 (2011), doi:10.1016\/j.eswa.2011.06.013","journal-title":"Elsevier-Expert Systems with Applications"},{"key":"29_CR41","first-page":"501","volume":"15","author":"D. Lowd","year":"2014","unstructured":"Lowd, D., Davis, J.: Improving Markov Network Structure Learning Using Decision Trees. Journal of Machine Learning Research\u00a015, 501\u2013532 (2014)","journal-title":"Journal of Machine Learning Research"},{"key":"29_CR42","unstructured":"Zaidi, N.A., Cerquides, J., Carman, M.J.: Alleviating Naive Bayes Attribute Independence Assumption by Attribute Weighting. Journal of Machine Learning Research\u00a014 (2013)"},{"key":"29_CR43","first-page":"325","volume":"17","author":"D. Anchiang","year":"2001","unstructured":"Anchiang, D., Chen, W., Fanwang, Y., Jinnhwang, A.: Rules Generation from the Decision Tree. Journal of Information Science and Engineering\u00a017, 325\u2013339 (2001)","journal-title":"Journal of Information Science and Engineering"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11218-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:31:44Z","timestamp":1746369104000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11218-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319112176","9783319112183"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11218-3_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}