{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T14:40:07Z","timestamp":1748788807163,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319302843"},{"type":"electronic","value":"9783319302850"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30285-0_27","type":"book-chapter","created":{"date-parts":[[2016,2,24]],"date-time":"2016-02-24T10:51:52Z","timestamp":1456311112000},"page":"332-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Network Intrusion Detection Based on Neural Networks and D-S Evidence"],"prefix":"10.1007","author":[{"given":"Chunlin","family":"Lu","sequence":"first","affiliation":[]},{"given":"Lidong","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Na","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,25]]},"reference":[{"issue":"4","key":"27_CR1","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1016\/j.eswa.2007.03.011","volume":"34","author":"SL Silva de","year":"2008","unstructured":"de Silva, S.L., dos Santos, F., Mancilha, D.: Detecting attack signatures in the real network traffic with ANNIDA. Expert Syst. Appl. 34(4), 2326\u20132333 (2008)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"27_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2002.1039860","volume":"40","author":"C Manikopoulos","year":"2002","unstructured":"Manikopoulos, C., Papavassiliou, S.: Network intrusion and fault detection: a statistical anomaly approach. IEEE Commun. Mag. 40(10), 76\u201382 (2002)","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"27_CR3","first-page":"13","volume":"39","author":"B Shah","year":"2012","unstructured":"Shah, B., Trivedi, B.: Artificial neural network based intrusion detection system: a survey. Int. J. Comput. Appl. 39(6), 13\u201318 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"5","key":"27_CR4","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.cose.2008.06.001","volume":"27","author":"R Beghdad","year":"2008","unstructured":"Beghdad, R.: Critical study of neural networks in detecting intrusions. Comput. Secur. 27(5), 168\u2013175 (2008)","journal-title":"Comput. Secur."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Wei, Z., Hao-yu, W., Xu, Z.: Intrusive detection systems design based on BP neural network. In: IEEE International Symposium on Distributed Computing and Applications to Business Engineering and Science (DCABES), pp. 462\u2013465 (2010)","DOI":"10.1109\/DCABES.2010.158"},{"key":"27_CR6","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection: support vector machines and neural networks. In: IEEE International Joint Conference on Neural Networks (ANNIE), pp. 1702\u20131707 (2002)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Pachghare, K., Kulkarni, P., Nikam, M.: Intrusion detection system using self organizing maps. In: IEEE International Conference on Intelligent Agent & Multi-Agent Systems, pp. 1\u20135 (2009)","DOI":"10.1109\/IAMA.2009.5228074"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Gao, M., Tian, J.: Network intrusion detection method based on improved simulated annealing neural network. In: IEEE International Conference on Measuring Technology and Mechatronics Automation, vol. 3, pp. 261\u2013264 (2009)","DOI":"10.1109\/ICMTMA.2009.548"},{"key":"27_CR9","unstructured":"Horeis, T. Intrusion detection with neural networks-combination of self-organizing maps and radial basis function networks for human expert integration. In: Computational Intelligence Society Student Research Grants (2003)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Mafra, M., Moll, V., da Silva Fraga, J.: Octopus-IIDS: An anomaly based intelligent intrusion detection system. In: IEEE Symposium on Computers and Communications, pp. 405\u2013410 (IEEE)","DOI":"10.1109\/ISCC.2010.5546735"},{"issue":"4","key":"27_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1002\/int.20203","volume":"22","author":"Y Chen","year":"2007","unstructured":"Chen, Y., Abraham, A., Yang, B.: Hybrid flexible neural tree based intrusion detection systems. Int. J. Intell. Syst. 22(4), 337\u2013352 (2007)","journal-title":"Int. J. Intell. Syst."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Guangjun, S., Jialin, Z., Zhenlong, S.: The research of dynamic change learning rate strategy in BP neural network and application in network intrusion detection. In: International Conference on Innovative Computing Information and Control, p. 513 (2008)","DOI":"10.1109\/ICICIC.2008.668"},{"issue":"9","key":"27_CR13","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. expert syst. appl. 37(9), 6225\u20136232 (2010)","journal-title":"expert syst. appl."},{"key":"27_CR14","first-page":"762","volume":"89","author":"J Montana","year":"1989","unstructured":"Montana, J., Davis, L.: Training feedforward neural networks using genetic algorithms. IJCAI 89, 762\u2013767 (1989)","journal-title":"IJCAI"},{"key":"27_CR15","first-page":"1344","volume":"2","author":"S Prasad","year":"2013","unstructured":"Prasad, S., Babu, V., Rao, B.: An intrusion detection system architecture based on neural networks and genetic algorithms. Int. J. Comput. Sci. Manage. Res. 2, 1344\u20131361 (2013)","journal-title":"Int. J. Comput. Sci. Manage. Res."},{"key":"27_CR16","first-page":"587","volume-title":"Lecture Notes in Electrical Engineering","author":"Lin Lin","year":"2013","unstructured":"Lin, L., Xie, X., Zhong, S.: A multiple classification method based on the DS evidence theory. In: Proceedings of the 9th International Symposium on Linear Drives for Industry Applications, pp. 587\u2013596 (2014)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Hu, W., Li, J., Gao, Q.: Intrusion detection engine based on Dempster-Shafer\u2019s theory of evidence. In: International Conference on Communications, Circuits and Systems Proceedings, pp. 3, pp. 1627\u20131631 (2006)","DOI":"10.1109\/ICCCAS.2006.284985"},{"key":"27_CR18","first-page":"13","volume":"2014","author":"Y Liu","year":"2014","unstructured":"Liu, Y., Wang, X., Liu, K.: Network anomaly detection system with optimized DS evidence theory. The Sci. World J. 2014, 13 (2014)","journal-title":"The Sci. World J."},{"issue":"5","key":"27_CR19","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.cose.2008.06.001","volume":"27","author":"R Beghdad","year":"2008","unstructured":"Beghdad, R.: Critical study of neural networks in detecting intrusions. Comput. Secur. 27(5), 168\u2013175 (2008)","journal-title":"Comput. Secur."},{"key":"27_CR20","unstructured":"Weka. Weka Program (2011). www.cs.waikato.ac.nz\/ml\/weka"},{"issue":"5","key":"27_CR21","first-page":"1802","volume":"7","author":"Y Yuan","year":"2011","unstructured":"Yuan, Y., Shang, S., Li, L.: Network intrusion detection using DS evidence combination with generalized regression neural network. J. Comput. Inf. Syst. 7(5), 1802\u20131809 (2011)","journal-title":"J. Comput. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Image and Video Technology \u2013 PSIVT 2015 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30285-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T14:01:49Z","timestamp":1748786509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30285-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319302843","9783319302850"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30285-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 February 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}