{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:30:40Z","timestamp":1743021040512,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319195773"},{"type":"electronic","value":"9783319195780"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19578-0_32","type":"book-chapter","created":{"date-parts":[[2015,5,12]],"date-time":"2015-05-12T04:07:21Z","timestamp":1431403641000},"page":"394-405","source":"Crossref","is-referenced-by-count":3,"title":["On Copulas-Based Classification Method for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Abdelkader","family":"Khobzaoui","sequence":"first","affiliation":[]},{"given":"Mhamed","family":"Mesfioui","sequence":"additional","affiliation":[]},{"given":"Abderrahmane","family":"Yousfate","sequence":"additional","affiliation":[]},{"given":"Boucif","family":"Amar Bensaber","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Agarwal, R., Joshi, M.V.: PNrule: A New Framework for Learning Classifier Models in Data Mining. In: Proceedings of the First SIAM International Conference on Data Mining, Chicago, IL, USA, April 5-7 (2001)","DOI":"10.1137\/1.9781611972719.29"},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.engappai.2014.02.009","volume":"32","author":"M. Chao","year":"2014","unstructured":"Chao, M., Xin, S.Z., Min, L.S.: Neural network ensembles based on copula methods and Distributed Multiobjective Central Force Optimization algorithm. Engineering Applications of Artificial Intelligence\u00a032, 203\u2013212 (2014)","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Chen, S.X., Huang, T.-M.: Nonparametric estimation of copula functions for dependence modelling. The Canadian Journal of Statistics\u00a035(2) (2007)","DOI":"10.1002\/cjs.5550350205"},{"key":"32_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/11496618_30","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"K. Burbeck","year":"2005","unstructured":"Burbeck, K., Nadjm-Tehrani, S.: ADWICE \u2013 anomaly detection with real-time incremental clustering. In: Park, C.-S., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 407\u2013424. Springer, Heidelberg (2005)"},{"key":"32_CR5","unstructured":"DARPA Intrusion Detection Data set, \n                    \n                      http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html"},{"key":"32_CR6","first-page":"274","volume":"65","author":"P. Deheuvels","year":"1979","unstructured":"Deheuvels, P.: La fonction de d\u00e9pendance empirique et ses propri\u00e9t\u00e9s. Un test non param\u00e9trique d\u00ednd\u00e9pendance. Bulletin de la classe des sciences. Acadimie Royale de Belgique\u00a065, 274\u2013292 (1979)","journal-title":"Bulletin de la classe des sciences. Acadimie Royale de Belgique"},{"key":"32_CR7","unstructured":"Dayu, Y., Qi, H.: A Network Intrusion Detection Method using Independent Component Analysis. In: International Conference on Pattern Recognition (ICPR), Tampa, FL, pp. 8\u201311 (2008)"},{"issue":"4","key":"32_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1257\/jep.15.4.11","volume":"15","author":"J. DiNardo","year":"2001","unstructured":"DiNardo, J., Tobias, J.L.: Nonparametric Density and Regression Estimation. Journal of Economic Perspectives\u00a015(4), 11\u201328 (2001)","journal-title":"Journal of Economic Perspectives"},{"key":"32_CR9","unstructured":"Eid, H.F., Darwish, A., Hassanien, A.E., Ajith, A.: Principle Components Analysis and Support Vector Machine based Intrusion Detection System. In: 10th International Conference on Intelligent Systems Design and Applications (2010)"},{"key":"32_CR10","unstructured":"Faraoun, K.M., Boukelif, A.: Securing network trafic using geneticaly evolved transformations. Malaysian Journal of Computer Science\u00a019(1) (2006)"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Farid, D.M., Harbi, N., Rahma, Z.M.: Combining naive bayes and decision tree for adaptive intrusion detection. International Journal of Network Security & Its Applications (IJNSA)\u00a02(2) (2010)","DOI":"10.5121\/ijnsa.2010.2202"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer (2000)","DOI":"10.1007\/978-3-642-56927-2"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/978-3-540-88623-5_41","volume-title":"Challenges for Next Generation Network Operations and Service Management","author":"H.A. Nguyen","year":"2008","unstructured":"Nguyen, H.A., Choi, D.: Application of Data Mining to Network Intrusion Detection: Classifier Selection Model. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol.\u00a05297, pp. 399\u2013408. Springer, Heidelberg (2008)"},{"issue":"4","key":"32_CR14","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L. Khan","year":"2007","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. The International Journal on Very Large Data Bases\u00a016(4), 507\u2013521 (2007)","journal-title":"The International Journal on Very Large Data Bases"},{"issue":"2","key":"32_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/846183.846201","volume":"1","author":"I. Levin","year":"2000","unstructured":"Levin, I.: KDD-99 Classifier Learning Contest LLSoft\u2019s Results Overview. ACM SIGKDD Explorations Newsletter\u00a01(2), 67\u201375 (2000)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"32_CR16","unstructured":"Maheshkumar, S., Gursel, S.: Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context. In: Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications, Las Vegas (MLMTA 2003), vol.\u00a01, pp. 209\u2013215 (2003)"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1214\/lnms\/1215452620","volume-title":"Distributions with Fixed Marginals and Related Topics","author":"A. Marshall","year":"1996","unstructured":"Marshall, A.: Copulas, marginals and joint distributions. In: R\u00fcschendorff, L., Schweizer, B., Taylor, M. (eds.) Distributions with Fixed Marginals and Related Topics, pp. 213\u2013222. Institute of Mathematical Statistics, Hayward (1996)"},{"issue":"3","key":"32_CR18","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1109\/TFUZZ.2006.882462","volume":"15","author":"G. Mayor","year":"2007","unstructured":"Mayor, G., Su\u00f1er, J., Torrens, J.: Sklar\u2019s theorem in finite settings. IEEE Transactions on Fuzzy Systems\u00a015(3), 410\u2013416 (2007)","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"32_CR19","series-title":"Ellis Horwood Series in Artificial Intelligence","volume-title":"Machine Learning, Neural and Statistical Classification","author":"D. Michie","year":"1994","unstructured":"Michie, D., Spiegelhalter, D.J., Tayler, C.C.: Machine Learning, Neural and Statistical Classification. Ellis Horwood Series in Artificial Intelligence. Prentice Hall, Upper Saddle River (1994)"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/72.914517","volume":"12","author":"K.R. M\u00fcller","year":"2001","unstructured":"M\u00fcller, K.R., Mika, S., R\u00e4tsch, G., Tsuda, K., Sch\u00f6lkopf, B.: An Introduction to Kernel-Based Learning Algorithms. IEEE Transactions on Neural Networks\u00a012, 181\u2013201 (2001)","journal-title":"IEEE Transactions on Neural Networks"},{"key":"32_CR21","volume-title":"An Introduction to Copulas","author":"R. Nelsen","year":"2006","unstructured":"Nelsen, R.: An Introduction to Copulas, 2nd edn. Springer, New York (2006)","edition":"2"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Pfahringer, B.: Winning the KDD99 classification cup: bagged boosting. ACM SIGKDD Explorations Newsletter 1(2), 65-66 (2000)","DOI":"10.1145\/846183.846200"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Quintela-del-R\u00edo, A., Est\u00e9vez-P\u00e9rez, G.: Nonparametric Kernel Distribution Function Estimator with kerdiest: An R Package for Bandwidth Choice and Applications. Journal of Statistical Software\u00a050(8) (2012)","DOI":"10.18637\/jss.v050.i08"},{"key":"32_CR24","unstructured":"The Comprehensive R Archive Network, \n                    \n                      http:\/\/cran.r-project.org\/"},{"key":"32_CR25","unstructured":"Rossiter, D.G.: Tutorial: Using the R Environment for Statistical Computing: An example with the Mercer & Hall wheat yield dataset. University of Twente, Faculty of Geo-Information Science & Earth Observation (ITC) Enschede, NL (2014)"},{"issue":"pt.8","key":"32_CR26","first-page":"619","volume":"190","author":"K. Santosh","year":"2011","unstructured":"Santosh, K., Sumit, K., Sukumar, N.: Multidensity Clustering Algorithm for Anomaly Detection Using KDD\u201999 Dataset. Advances in Computing and Communications\u00a0190(pt.8), 619\u2013630 (2011)","journal-title":"Advances in Computing and Communications"},{"key":"32_CR27","unstructured":"Singh, S., Silakari, S.: Generalized Discriminant Analysis algorithm for feature reduction in Cyber Attack Detection System. International Journal of Computer Science and Information Security\u00a06(1) (2009)"},{"key":"32_CR28","first-page":"229","volume":"8","author":"A. Sklar","year":"1959","unstructured":"Sklar, A.: Fonction de r\u00e9partition \u00e1 n dimensions et leurs marges. Publ. Inst. Statist. Univ. Paris\u00a08, 229\u2013231 (1959)","journal-title":"Publ. Inst. Statist. Univ. Paris"},{"key":"32_CR29","unstructured":"snow: Simple Network of Workstations, \n                    \n                      http:\/\/cran.r-project.org\/web\/packages\/snow\/index.html"},{"key":"32_CR30","unstructured":"snowfall: Easier cluster computing (based on snow), \n                    \n                      http:\/\/cran.r-project.org\/web\/packages\/snowfall\/index.html"},{"key":"32_CR31","series-title":"Monographs on Statistics and Applied Probability","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3324-9","volume-title":"Density Estimation for Statistics and Data Analysis","author":"B.W. Silverman","year":"1986","unstructured":"Silverman, B.W.: Density Estimation for Statistics and Data Analysis. Monographs on Statistics and Applied Probability. Chapman and Hall, London (1986)"},{"issue":"3","key":"32_CR32","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1214\/aos\/1176348768","volume":"20","author":"D.G. Terrell","year":"1992","unstructured":"Terrell, D.G., Scott, D.W.: Variable kernel density estimation. Annals of Statistics\u00a020(3), 1236\u20131265 (1992)","journal-title":"Annals of Statistics"},{"key":"32_CR33","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1016\/j.comcom.2007.05.002","volume":"30","author":"A.N. Toosi","year":"2007","unstructured":"Toosi, A.N., Kahani, M.: A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer Communications\u00a030, 2201\u20132212 (2007)","journal-title":"Computer Communications"},{"key":"32_CR34","unstructured":"Yeung, D.Y., Chow, C.: Parzen-window Network Intrusion Detectors. In: 16th International Conference on Pattern Recognition, Quebec, Canada, pp. 11\u201315 (2002)"}],"container-title":["IFIP Advances in Information and Communication Technology","Computer Science and Its Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19578-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T20:54:09Z","timestamp":1559163249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19578-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319195773","9783319195780"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19578-0_32","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]}}}