{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:59:07Z","timestamp":1743155947683,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319165486"},{"type":"electronic","value":"9783319165493"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16549-3_5","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T05:30:34Z","timestamp":1426483834000},"page":"54-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Combining Ensemble of Classifiers by Using Genetic Programming for Cyber Security Applications"],"prefix":"10.1007","author":[{"given":"Gianluigi","family":"Folino","sequence":"first","affiliation":[]},{"given":"Francesco Sergio","family":"Pisani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"5_CR1","unstructured":"CERT Australia: Cyber crime and security survey report. Technical report (2012)"},{"key":"5_CR2","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Mach. Learn. 24, 123\u2013140 (1996)","journal-title":"Mach. Learn."},{"key":"5_CR3","unstructured":"Freund, Y., Shapire, R.: Experiments with a new boosting algorithm. In: Machine Learning: Proceedings of the Thirteenth International Conference (ICML 1996), pp. 148\u2013156. Morgan Kaufmann (1996)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TEVC.2002.806168","volume":"7","author":"G Folino","year":"2003","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: A scalable cellular implementation of parallel genetic programming. IEEE Trans. Evol. Comput. 7, 37\u201353 (2003)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"de Oliveira, D.F., Canuto, A.M.P., de Souto, M.C.P.: Use of multi-objective genetic algorithms to investigate the diversity\/accuracy dilemma in heterogeneous ensembles. In: International Joint Conference on Neural Networks, pp. 2339\u20132346. IEEE (2009)","DOI":"10.1109\/IJCNN.2009.5178758"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TEVC.2007.906658","volume":"12","author":"G Folino","year":"2008","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: Training distributed GP ensemble with a selective algorithm based on clustering and pruning for pattern classification. IEEE Trans. Evol. Comput. 12, 458\u2013468 (2008)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.ins.2013.09.049","volume":"258","author":"CD Stefano","year":"2014","unstructured":"Stefano, C.D., Folino, G., Fontanella, F., di Freca, A.S.: Using bayesian networks for selecting classifiers in GP ensembles. Inf. Sci. 258, 200\u2013216 (2014)","journal-title":"Inf. Sci."},{"key":"5_CR8","unstructured":"Sylvester, J., Chawla, N.V.: Evolutionary ensembles: combining learning agents using genetic algorithms. In: AAAI Workshop on Multiagent Learning, pp. 46\u201351 (2005)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-540-72523-7_40","volume-title":"Multiple Classifier Systems","author":"NV Chawla","year":"2007","unstructured":"Chawla, N.V., Sylvester, J.: Exploiting diversity in ensembles: improving the performance on unbalanced datasets. In: Haindl, M., Kittler, J., Roli, F. (eds.) MCS 2007. LNCS, vol. 4472, pp. 397\u2013406. Springer, Heidelberg (2007)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Sylvester, J., Chawla, N.V.: Evolutionary ensemble creation and thinning. In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, pp. 5148\u20135155. IEEE (2006)","DOI":"10.1109\/IJCNN.2006.247245"},{"key":"5_CR11","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-25664-6_33","volume-title":"Foundations of Intelligent Systems","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Gao, Y., Shen, R., Yang, F.: Selective ensemble approach for classification of datasets with incomplete values. In: Wang, Y., Li, T. (eds.) ISKE2011. AISC, vol. 122, pp. 281\u2013286. Springer, Heidelberg (2011)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Acosta-Mendoza, N., Morales-Reyes, A., Escalante, H.J., Gago-Alonso, A.: Learning to assemble classifiers via genetic programming. IJPRAI 28 (2014)","DOI":"10.1142\/S0218001414600052"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1023\/A:1012978805372","volume":"2","author":"M Brameier","year":"2001","unstructured":"Brameier, M., Banzhaf, W.: Evolving teams of predictors with linear genetic programming. Genet. Program Evolvable Mach. 2, 381\u2013407 (2001)","journal-title":"Genet. Program Evolvable Mach."},{"key":"5_CR14","first-page":"197","volume":"5","author":"RE Schapire","year":"1990","unstructured":"Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5, 197\u2013227 (1990)","journal-title":"Mach. Learn."},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1006\/inco.1995.1136","volume":"121","author":"RE Schapire","year":"1995","unstructured":"Schapire, R.E.: Boosting a weak learning by majority. Inf. Comput. 121, 256\u2013285 (1995)","journal-title":"Inf. Comput."},{"key":"5_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264","volume-title":"Combining Pattern Classifiers: Methods and Algorithms","author":"L Kuncheva","year":"2004","unstructured":"Kuncheva, L.: Combining Pattern Classifiers: Methods and Algorithms. Wiley-Interscience, Chichester (2004)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-21323-6_3","volume-title":"Computational Intelligence in Security for Information Systems","author":"E Bahri","year":"2011","unstructured":"Bahri, E., Harbi, N., Huu, H.N.: Approach based ensemble methods for better and faster intrusion detection. In: Herrero, A., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 17\u201324. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16549-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T07:46:37Z","timestamp":1676015197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16549-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319165486","9783319165493"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16549-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}