{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T22:40:01Z","timestamp":1747521601899,"version":"3.40.5"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319149769"},{"type":"electronic","value":"9783319149776"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14977-6_31","type":"book-chapter","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T09:23:24Z","timestamp":1422437004000},"page":"318-324","source":"Crossref","is-referenced-by-count":2,"title":["An Evolutionary Computation Based Classification Model for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Ashalata","family":"Panigrahi","sequence":"first","affiliation":[]},{"given":"Manas Ranjan","family":"Patra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Koza, J.R.: Genetic Programming. MIT Press (1992)"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Dasgupta, D.: Advances in Artificial Immune Systems. IEEE Computational Intelligence Magazine (2006)","DOI":"10.1109\/CI-M.2006.248056"},{"key":"31_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59901-9","volume-title":"Artificial Immunity Systems and their Applications","author":"D. Dasgupta","year":"1999","unstructured":"Dasgupta, D.: Artificial Immunity Systems and their Applications. Springer, Berlin (1999)"},{"key":"31_CR4","unstructured":"Sridevi, R., Chattemvelli, R.: Genetic algorithm and Artificial immune systems: A combinational approach for network intrusion detection. In: ICAESM, pp. 494\u2013498 (2012)"},{"key":"31_CR5","unstructured":"Castro, L.D., Von Zuben, F.: Artificial immune systems: Part 1 basic theory and applications. DCA 01\/99, Tech. Rep. (1999)"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"L.D. Castro","year":"2002","unstructured":"Castro, L.D., Von Zuben, F.: Learning and optimization using the clonal selection principle. IEEE Trans. on Evolutionary Computation\u00a06, 239\u2013251 (2002)","journal-title":"IEEE Trans. on Evolutionary Computation"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., et al.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence in Security and Defense Applications (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Gong, S.: Feature selection method for network intrusion based on GQPSO attribute reduction. In: Int. Conference on Multimedia Technology (ICMT), pp. 6365\u20136368 (2011)","DOI":"10.1109\/ICMT.2011.6003117"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14977-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T22:08:24Z","timestamp":1747519704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14977-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319149769","9783319149776"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14977-6_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}