{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:29:07Z","timestamp":1743118147603,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319687582"},{"type":"electronic","value":"9783319687599"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68759-9_46","type":"book-chapter","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T22:33:42Z","timestamp":1507847622000},"page":"569-580","source":"Crossref","is-referenced-by-count":4,"title":["Automatic Feature Construction for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Binh","family":"Tran","sequence":"first","affiliation":[]},{"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"46_CR1","unstructured":"Browne, R.: Nato: we ward off 500 cyberattacks each month, January 2017. http:\/\/edition.cnn.com\/2017\/01\/19\/politics\/nato-500-cyberattacks-monthly\/"},{"key":"46_CR2","unstructured":"Symantec: Ransom.wannacry, March 2017. https:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2017-051310-3522-99"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Fratantonio, Y., Qian, C., Chung, S., Lee, W.: Cloak and Dagger: from two permissions to complete control of the UI feedback loop. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, San Jose, CA, May 2017","DOI":"10.1109\/SP.2017.39"},{"issue":"1\u20132","key":"46_CR4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garc\u00eda-Teodoro","year":"2009","unstructured":"Garc\u00eda-Teodoro, P., D\u00edaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., V\u00e1zquez, E.: Anomaly-based network intrusion detection: techniques. Syst. Chall. Comput. Secur. 28(1\u20132), 18\u201328 (2009)","journal-title":"Syst. Chall. Comput. Secur."},{"issue":"1","key":"46_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu, S.X., Banzhaf, W.: Review: the use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10(1), 1\u201335 (2010)","journal-title":"Appl. Soft Comput."},{"issue":"10","key":"46_CR6","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C.F., Hsu, Y.F., Lin, C.Y., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994\u201312000 (2009)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"46_CR7","first-page":"83","volume":"21","author":"H Al-Sahaf","year":"2017","unstructured":"Al-Sahaf, H., Al-Sahaf, A., Xue, B., Johnston, M., Zhang, M.: Automatically evolving rotation-invariant texture image descriptors by genetic programming. IEEE Trans. Evol. Comput. 21(1), 83\u2013101 (2017)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"46_CR8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s12293-015-0173-y","volume":"8","author":"B Tran","year":"2015","unstructured":"Tran, B., Xue, B., Zhang, M.: Genetic programming for feature construction and selection in classification on high-dimensional data. Memet. Comput. 8(1), 3\u201315 (2015)","journal-title":"Memet. Comput."},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Tran, B., Zhang, M., Xue, B.: Multiple feature construction in classification on high-dimensional data using GP. In: IEEE Symposium Series on Computational Intelligence (SSCI), pp. 210\u2013218, December 2017","DOI":"10.1109\/SSCI.2016.7850130"},{"key":"46_CR10","unstructured":"Symantec: preparing for a cyber attack, January 2017. http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/other_resources\/b-preparing-for-a-cyber-attack-interactive-SYM285k_050913.pdf"},{"key":"46_CR11","unstructured":"Habibi, A., et al.: UNB ISCX NSL-KDD dataset. http:\/\/nsl.cs.unb.ca\/NSL-KDD\/"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Defense Applications, CISDA 2009, Piscataway, NJ, USA, pp. 53\u201358. IEEE Press (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"3","key":"46_CR13","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cose.2011.12.012","volume":"31","author":"A Shiravi","year":"2012","unstructured":"Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 31(3), 357\u2013374 (2012)","journal-title":"Comput. Secur."},{"key":"46_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-01181-8_1","volume-title":"Genetic Programming","author":"R Curry","year":"2009","unstructured":"Curry, R., Heywood, M.I.: One-class genetic programming. In: Vanneschi, L., Gustafson, S., Moraglio, A., De Falco, I., Ebner, M. (eds.) EuroGP 2009. LNCS, vol. 5481, pp. 1\u201312. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01181-8_1"},{"key":"46_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-30668-1_1","volume-title":"Genetic Programming","author":"VL Cao","year":"2016","unstructured":"Cao, V.L., Nicolau, M., McDermott, J.: One-class classification for anomaly detection with kernel density estimation and genetic programming. In: Heywood, M.I., McDermott, J., Castelli, M., Costa, E., Sim, K. (eds.) EuroGP 2016. LNCS, vol. 9594, pp. 3\u201318. Springer, Cham (2016). doi: 10.1007\/978-3-319-30668-1_1"},{"key":"46_CR16","doi-asserted-by":"crossref","unstructured":"To, C., Elati, M.: A Parallel genetic programming for single class classification. In: Proceedings of the 15th Annual Conference Companion on Genetic and Evolutionary Computation, GECCO 2013 Companion, pp. 1579\u20131586. ACM, New York (2013)","DOI":"10.1145\/2464576.2466811"},{"issue":"3","key":"46_CR17","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/TEVC.2004.841683","volume":"9","author":"D Song","year":"2005","unstructured":"Song, D., Heywood, M.I., Zincir-Heywood, A.N.: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Trans. Evol. Comput. 9(3), 225\u2013239 (2005)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Wang, W., Gombault, S., Guyet, T.: Towards fast detecting intrusions: using key attributes of network traffic. In: Proceedings of the 2008 The Third International Conference on Internet Monitoring and Protection, ICIMP 2008, pp. 86\u201391. IEEE Computer Society, Washington, DC (2008)","DOI":"10.1109\/ICIMP.2008.13"},{"key":"46_CR19","doi-asserted-by":"crossref","unstructured":"Zargari, S., Voorhis, D.: Feature selection in the corrected KDD-dataset. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, pp. 174\u2013180, September 2012","DOI":"10.1109\/EIDWT.2012.10"},{"issue":"4","key":"46_CR20","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3(4), 227\u2013261 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"46_CR21","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1023\/A:1007465528199","volume":"29","author":"N Friedman","year":"1997","unstructured":"Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Mach. Learn. 29(2), 131\u2013163 (1997)","journal-title":"Mach. Learn."},{"key":"46_CR22","volume-title":"C4.5: Programs for Machine Learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"key":"46_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-55696-3_14","volume-title":"Genetic Programming","author":"B Tran","year":"2017","unstructured":"Tran, B., Xue, B., Zhang, M.: Using feature clustering for GP-based feature construction on high-dimensional data. In: McDermott, J., Castelli, M., Sekanina, L., Haasdijk, E., Garc\u00eda-S\u00e1nchez, P. (eds.) EuroGP 2017. LNCS, vol. 10196, pp. 210\u2013226. Springer, Cham (2017). doi: 10.1007\/978-3-319-55696-3_14"},{"issue":"6","key":"46_CR24","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1109\/TEVC.2013.2293393","volume":"18","author":"U Bhowan","year":"2014","unstructured":"Bhowan, U., Johnston, M., Zhang, M., Yao, X.: Reusing genetic programming for ensemble selection in classification of unbalanced data. IEEE Trans. Evol. Comput. 18(6), 893\u2013908 (2014)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"46_CR25","unstructured":"Evolutionary Computation Laboratory: ECJ: a Java-based evolutionary computation research system. https:\/\/cs.gmu.edu\/eclab\/projects\/ecj\/"}],"container-title":["Lecture Notes in Computer Science","Simulated Evolution and Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68759-9_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T12:18:52Z","timestamp":1570191532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68759-9_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319687582","9783319687599"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68759-9_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}