{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:29:34Z","timestamp":1725902974163},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_98","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"967-974","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Algorithm for Feature Selection Used in Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Yongle","family":"Hao","sequence":"first","affiliation":[]},{"given":"Ying","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Longjie","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS). NIST special publication, vol. 800, p. 94 (2007)","key":"98_CR1","DOI":"10.6028\/NIST.SP.800-94"},{"key":"98_CR2","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1016\/j.comcom.2011.07.001","volume":"34","author":"P Sangkatsanee","year":"2011","unstructured":"Sangkatsanee, P., Wattanapongsakorn, N., Charnsripinyo, C.: Practical real-time intrusion detection using machine learning approaches. Comput. Commun. 34, 2227\u20132235 (2011)","journal-title":"Comput. Commun."},{"doi-asserted-by":"crossref","unstructured":"James, G., Witten, D., Hastie, T., Tibshirani, R.: An Introduction to Statistical Learning, vol. 103. Springer, Heidelberg (2013)","key":"98_CR3","DOI":"10.1007\/978-1-4614-7138-7"},{"key":"98_CR4","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"doi-asserted-by":"crossref","unstructured":"Nguyen, H.T., Petrovi\u0107, S., Franke, K.: A comparison of feature-selection methods for intrusion detection. In: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 242\u2013255 (2010)","key":"98_CR5","DOI":"10.1007\/978-3-642-14706-7_19"},{"unstructured":"He, X., Cai, D., Niyogi, P.: Laplacian score for feature selection. In: NIPS, vol. 189 (2005)","key":"98_CR6"},{"unstructured":"Kira, K., Rendell, L.A.: The feature selection problem: traditional methods and a new algorithm. In: AAAI, pp. 129\u2013134 (1992)","key":"98_CR7"},{"key":"98_CR8","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1023\/A:1025667309714","volume":"53","author":"M Robnik-\u0160ikonja","year":"2003","unstructured":"Robnik-\u0160ikonja, M., Kononenko, I.: Theoretical and empirical analysis of ReliefF and RReliefF. Mach. Learn. 53, 23\u201369 (2003)","journal-title":"Mach. Learn."},{"unstructured":"Liu, H., Setiono, R.: Chi2: feature selection and discretization of numeric attributes. In: The Seventh International Conference on Tools with Artificial Intelligence, pp. 388\u2013391 (1995)","key":"98_CR9"},{"unstructured":"Yang, Y., Shen, H.T., Ma, Z., Huang, Z., Zhou, X.: L2, 1-norm regularized discriminative feature selection for unsupervised learning. In: IJCAI Proceedings of International Joint Conference on Artificial Intelligence, p. 1589 (2011)","key":"98_CR10"},{"key":"98_CR11","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.neucom.2016.03.031","volume":"199","author":"SM Hosseini Bamakan","year":"2016","unstructured":"Hosseini Bamakan, S.M., Wang, H., Yingjie, T., Shi, Y.: An effective intrusion detection framework based on MCLP\/SVM optimized by time-varying chaos particle swarm optimization. Neurocomputing 199, 90\u2013102 (2016)","journal-title":"Neurocomputing"},{"doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.: A detailed analysis of the KDD CUP 99 data set. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1\u20136 (2009)","key":"98_CR12","DOI":"10.1109\/CISDA.2009.5356528"},{"unstructured":"Hall, M.A.: Correlation-based feature selection of discrete and numeric class machine learning. In: ICML, pp. 359\u2013366 (2000)","key":"98_CR13"},{"key":"98_CR14","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","volume":"78","author":"W-C Lin","year":"2015","unstructured":"Lin, W.-C., Ke, S.-W., Tsai, C.-F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst. 78, 13\u201321 (2015)","journal-title":"Knowl. Based Syst."},{"key":"98_CR15","doi-asserted-by":"crossref","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst. Appl. 37, 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_98","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T07:03:37Z","timestamp":1569654217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_98","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}