{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:10:08Z","timestamp":1761581408324,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312033"},{"type":"electronic","value":"9783319312040"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31204-0_21","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T07:24:40Z","timestamp":1458631480000},"page":"315-331","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Distributed Intrusion Detection Framework Based on Evolved Specialized Ensembles of Classifiers"],"prefix":"10.1007","author":[{"given":"Gianluigi","family":"Folino","sequence":"first","affiliation":[]},{"given":"Francesco Sergio","family":"Pisani","sequence":"additional","affiliation":[]},{"given":"Pietro","family":"Sabatino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"M Bhuyan","year":"2014","unstructured":"Bhuyan, M., Bhattacharyya, D., Kalita, J.: Network anomaly detection: methods, systems and tools. Commun. Surv. Tutorials IEEE 16, 303\u2013336 (2014)","journal-title":"Commun. Surv. Tutorials IEEE"},{"key":"21_CR2","first-page":"123","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Mach. Learn. 24, 123\u2013140 (1996)","journal-title":"Mach. Learn."},{"key":"21_CR3","unstructured":"Freund, Y., Shapire, R.: Experiments with a new boosting algorithm. In: Machine Learning, Proceedings of the Thirteenth International Conference (ICML 1996), Morgan Kaufmann, pp. 148\u2013156 (1996)"},{"key":"21_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264","volume-title":"Combining Pattern Classifiers: Methods and Algorithms","author":"L Kuncheva","year":"2004","unstructured":"Kuncheva, L.: Combining Pattern Classifiers: Methods and Algorithms. Wiley, Chichester (2004)"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TEVC.2002.806168","volume":"7","author":"G Folino","year":"2003","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: A scalable cellular implementation of parallel genetic programming. IEEE Trans. Evol. Comput. 7, 37\u201353 (2003)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., Folino, G., Sabatino, P.: A distributed framework for supporting adaptive ensemble-based intrusion detection. In: 2015 IEEE International Conference on Big Data, Big Data 2015, Santa Clara, CA, USA, 29 October - 1 November 2015, pp. 1910\u20131916 (2015)","DOI":"10.1109\/BigData.2015.7363967"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31, 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-26362-5_1","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"KN Khasawneh","year":"2015","unstructured":"Khasawneh, K.N., Ozsoy, M., Donovick, C., Abu-Ghazaleh, N., Ponomarev, D.: Ensemble learning for low-level hardware-supported malware detection. In: Bos, H. (ed.) Raid 2015. LNCS, vol. 9404, pp. 3\u201325. Springer, Heidelberg (2015)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/978-3-319-16549-3_5","volume-title":"Applications of Evolutionary Computation","author":"G Folino","year":"2015","unstructured":"Folino, G., Pisani, F.S.: Combining ensemble of classifiers by using genetic programming for cyber security applications. In: Mora, A.M., Squillero, G. (eds.) EvoApplications 2015. LNCS, vol. 9028, pp. 54\u201366. Springer International Publishing, Switzerland (2015)"},{"key":"21_CR10","first-page":"19","volume":"28","author":"N Acosta-Mendoza","year":"2014","unstructured":"Acosta-Mendoza, N., Morales-Reyes, A., Escalante, H.J., Gago-Alonso, A.: Learning to assemble classifiers via genetic programming. IJPRAI 28, 19 (2014)","journal-title":"IJPRAI"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TSMCC.2010.2048428","volume":"40","author":"M Tavallaee","year":"2010","unstructured":"Tavallaee, M., Stakhanova, N., Ghorbani, A.: Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 40, 516\u2013524 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-45248-5_13","volume-title":"Recent Advances in Intrusion Detection","author":"MV Mahoney","year":"2003","unstructured":"Mahoney, M.V., Chan, P.K.: An analysis of the 1999 DARPA\/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 220\u2013237. Springer, Heidelberg (2003)"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3, 262\u2013294 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Brown, C., Cowperthwaite, A., Hijazi, A., Somayaji, A.: Analysis of the 1999 DARPA\/Lincoln laboratory IDS evaluation data with NetADHICT. In: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications. CISDA 2009, Piscataway, NJ, USA, pp. 67\u201373. IEEE Press (2009)","DOI":"10.1109\/CISDA.2009.5356522"},{"key":"21_CR15","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009, pp. 1\u20136 (2009)"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/90.330413","volume":"2","author":"V Paxson","year":"1994","unstructured":"Paxson, V.: Empirically derived analytic models of wide-area TCP connections. IEEE\/ACM Trans. Netw. 2, 316\u2013336 (1994)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"21_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-07941-7_2","volume-title":"Computer Networks","author":"P Foremski","year":"2014","unstructured":"Foremski, P., Callegari, C., Pagano, M.: Waterfall: rapid identification of IP flows using cascade classification. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 14\u201323. Springer, Heidelberg (2014)"},{"key":"21_CR18","first-page":"197","volume":"5","author":"RE Schapire","year":"1990","unstructured":"Schapire, R.E.: The strength of weak learnability. Mach. Learn. 5, 197\u2013227 (1990)","journal-title":"Mach. Learn."},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1006\/inco.1995.1136","volume":"121","author":"RE Schapire","year":"1995","unstructured":"Schapire, R.E.: Boosting a weak learning by majority. Inf. Comput. 121, 256\u2013285 (1995)","journal-title":"Inf. Comput."},{"key":"21_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264","volume-title":"Combining Pattern Classifiers: Methods and Algorithms","author":"L Kuncheva","year":"2004","unstructured":"Kuncheva, L.: Combining Pattern Classifiers: Methods and Algorithms. Wiley-Interscience, New York (2004)"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-21323-6_3","volume-title":"Computational Intelligence in Security for Information Systems","author":"E Bahri","year":"2011","unstructured":"Bahri, E., Harbi, N., Huu, H.N.: Approach based ensemble methods for better and faster intrusion detection. In: Herrero, A., Corchado, E. (eds.) CISIS 2011. LNCS, vol. 6694, pp. 17\u201324. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31204-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:01:37Z","timestamp":1559408497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31204-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312033","9783319312040"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31204-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}