{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:01:48Z","timestamp":1746504108784,"version":"3.40.4"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319126364"},{"type":"electronic","value":"9783319126371"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12637-1_25","type":"book-chapter","created":{"date-parts":[[2014,10,20]],"date-time":"2014-10-20T11:42:45Z","timestamp":1413805365000},"page":"199-206","source":"Crossref","is-referenced-by-count":2,"title":["BOOSTRON: Boosting Based Perceptron Learning"],"prefix":"10.1007","author":[{"given":"Mirza M.","family":"Baig","sequence":"first","affiliation":[]},{"given":"Mian. M.","family":"Awais","sequence":"additional","affiliation":[]},{"given":"El-Sayed M.","family":"El-Alfy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"25_CR1","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1037\/h0042519","volume":"65","author":"F.. Rosenblatt","year":"1958","unstructured":"Rosenblatt, F.: The perceptron: A probabilistic model for information storage and organization in the brain. Psychological Review\u00a065(6), 386 (1958)","journal-title":"Psychological Review"},{"key":"25_CR2","unstructured":"Hertz, J., Anders, K., Richard, G.P.: Introduction to the theory of neural computation. Addison Wesley (1990)"},{"key":"25_CR3","unstructured":"Nielson, H.R.: Neurocomputing. Addison Wesley (1990)"},{"key":"25_CR4","series-title":"Foundations","volume-title":"Parallel and Distributed Processing: Explorations in Microstructure of Cognition","author":"D.E. Rumhlhart","year":"1990","unstructured":"Rumhlhart, D.E., McClelland, J.L.: Parallel and Distributed Processing: Explorations in Microstructure of Cognition. Foundations, vol.\u00a01. MIT Press, Cambridge (1990)"},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"38","author":"J. Friedman","year":"2000","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regression: A statistical view of boosting. The Annals of Statistics\u00a038(2), 337\u2013374 (2000)","journal-title":"The Annals of Statistics"},{"issue":"1","key":"25_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y. Freund","year":"1997","unstructured":"Freund, Y., Schapire, R.E.: A Decision Theoretic Generlization of Online Learning. Journal of Computer and System Sciences\u00a055(1), 119\u2013139 (1997)","journal-title":"Journal of Computer and System Sciences"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Iba, W., Langley, P.: Induction of One-Level Decision Trees. In: Proceedings of the Ninth International Conference on Machine Learning (1992)","DOI":"10.1016\/B978-1-55860-247-2.50035-8"},{"issue":"3","key":"25_CR8","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1023\/A:1007614523901","volume":"37","author":"R.E. Schapire","year":"1999","unstructured":"Schapire, R.E., Singer, Y.: Improved Boosting algorithm using confidence rated predictions. Machine Learning\u00a037(3), 297\u2013336 (1999)","journal-title":"Machine Learning"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2001, vol.\u00a01, p. 511 (2001)","DOI":"10.1109\/CVPR.2001.990517"},{"key":"25_CR10","unstructured":"Frank, A., Asuncion, A.: UCI Machine Learning Repository. School of Information and Computer Science. University of California, Irvine, CA (2010), http:\/\/archive.ics.uci.edu\/ml"},{"key":"25_CR11","unstructured":"KDD Cup 1999 dataset for network-based intrusion detection systems (1999), http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Feng, W., Zhang, Q., Hu, G., Huang, J.X.: Mining network data for intrusion detection through combining SVMs with ant colony networks. Future Generation Computer Systems (2013)","DOI":"10.1016\/j.future.2013.06.027"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.proenv.2011.12.040","volume":"11","author":"W. Li","year":"2011","unstructured":"Li, W., Liu, Z.: A method of SVM with normalization in intrusion detection. Procedia Environmental Sciences\u00a011, 256\u2013262 (2011)","journal-title":"Procedia Environmental Sciences"},{"issue":"1","key":"25_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jksuci.2011.10.001","volume":"24","author":"H. Altwaijry","year":"2012","unstructured":"Altwaijry, H., Algarny, S.: Bayesian based intrusion detection system. Journal of King Saud University, Computer and Information Sciences\u00a024(1), 1\u20136 (2012)","journal-title":"Journal of King Saud University, Computer and Information Sciences"},{"issue":"4","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","volume":"34","author":"F. Amiri","year":"2011","unstructured":"Amiri, F., Yousefi, M.R., Lucas, C., Shakery, A., Yazdani, N.: Mutual information-based feature selection for intrusion detection systems. Journal of Network and Computer Applications\u00a034(4), 1184\u20131199 (2011)","journal-title":"Journal of Network and Computer Applications"},{"issue":"5","key":"25_CR16","doi-asserted-by":"publisher","first-page":"5947","DOI":"10.1016\/j.eswa.2010.11.028","volume":"38","author":"V. Bol\u00f3n-Canedo","year":"2011","unstructured":"Bol\u00f3n-Canedo, V., S\u00e1nchez-Maro\u00f1o, N., Alonso-Betanzos, A.: Feature selection and classification in multiple class datasets: An application to KDD cup 99 dataset. Expert Systems with Applications\u00a038(5), 5947\u20135957 (2011)","journal-title":"Expert Systems with Applications"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12637-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T06:55:16Z","timestamp":1746428116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12637-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319126364","9783319126371"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12637-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}