{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T07:03:56Z","timestamp":1756191836144,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926384"},{"type":"electronic","value":"9783319926391"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92639-1_17","type":"book-chapter","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T10:31:25Z","timestamp":1528367485000},"page":"197-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Tuning CNN Input Layout for IDS with Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Blanco","sequence":"first","affiliation":[]},{"given":"Juan J.","family":"Cilla","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Malag\u00f3n","sequence":"additional","affiliation":[]},{"given":"Ignacio","family":"Penas","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 M.","family":"Moya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,8]]},"reference":[{"key":"17_CR1","unstructured":"KDD cup (1999). http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"17_CR2","unstructured":"NSL-KDD data set for network-based intrusion detection systems. http:\/\/nsl.cs.unb.ca\/NSL-KDD\/"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS), 2015, pp. 1\u20136. IEEE Stream (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1\u20133","key":"17_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa, N., Slay, J.: The evaluation of network anomaly detection systems: statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Inf. Secur. J. Global Perspect. 25(1\u20133), 18\u201331 (2016)","journal-title":"Inf. Secur. J. Global Perspect."},{"issue":"4","key":"17_CR5","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.3233\/JIFS-169230","volume":"32","author":"MM Baig","year":"2017","unstructured":"Baig, M.M., Awais, M.M., El-Alfy, E.M.: A multiclass cascade of artificial neural network for network intrusion detection. J. Intell. Fuzzy Syst. 32(4), 2875\u20132883 (2017)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"17_CR6","unstructured":"Ryan, J., Lin, M.J., Miikkulainen, R.: Intrusion detection with neural networks. In: Proceedings of the 1997 Conference on Advances in Neural Information Processing Systems 10. NIPS 1997, pp. 943\u2013949. MIT Press, Cambridge (1998)"},{"key":"17_CR7","unstructured":"Moradi, M., Zulkernine, M.: A neural network based system for intrusion detection and classification of attacks. In: IEEE International Conference on Advances in Intelligent Systems - Theory and Applications (2004)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Kukielka, P., Kotulski, Z.: Analysis of neural networks usage for detection of a new attack in IDS. In: Annales UMCS, Information, vol. 10, no. 1, pp. 51\u201359, January 2010","DOI":"10.2478\/v10065-010-0035-7"},{"key":"17_CR9","unstructured":"Revathi, S., Malathi, A.: A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Int. J. Eng. Res. Technol. (2013). ESRSA Publications"},{"key":"17_CR10","first-page":"508","volume-title":"International Joint Conference SOCO\u201916-CISIS\u201916-ICEUTE\u201916","author":"C\u00e9sar Guevara","year":"2016","unstructured":"Guevara, C., Santos, M., L\u00f3pez, V.: Intrusion detection with neural networks based on knowledge extraction by decision tree. In: International Joint Conference SOCO 2016-CISIS 2016-ICEUTE 2016, San Sebasti\u00e1n, Spain, pp. 508\u2013517, October 2016"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Devaraju, S., Ramakrishnan, S.: Performance comparison for intrusion detection system using neural network with KDD dataset. ICTACT J. Soft Comput. 4(3) (2014)","DOI":"10.21917\/ijsc.2014.0106"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258\u2013263, October 2016","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Heba, F.E., Darwish, A., Hassanien, A.E., Abraham, A.: Principle components analysis and support vector machine based intrusion detection system. In: 2010 10th International Conference on Intelligent Systems Design and Applications. pp. 363\u2013367, November 2010","DOI":"10.1109\/ISDA.2010.5687239"},{"key":"17_CR15","series-title":"Advances in Intelligent and Soft Computing","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-20505-7_26","volume-title":"Soft Computing in Industrial Applications","author":"MA Salama","year":"2011","unstructured":"Salama, M.A., Eid, H.F., Ramadan, R.A., Darwish, A., Hassanien, A.E.: Hybrid intelligent intrusion detection scheme. In: Gaspar-Cunha, A., Takahashi, R., Schaefer, G., Costa, L. (eds.) Soft Computing in Industrial Applications. AINSC, vol. 96, pp. 293\u2013303. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20505-7_26"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (Formerly BIONETICS), BICT 2015, ICST, Brussels, Belgium, Belgium, pp. 21\u201326. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Gharaee, H., Hosseinvand, H.: A new feature selection ids based on genetic algorithm and SVM. In: 2016 8th International Symposium on Telecommunications (IST), pp. 139\u2013144, September 2016","DOI":"10.1109\/ISTEL.2016.7881798"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Guha, S., Yau, S.S., Buduru, A.B.: Attack detection in cloud infrastructures using artificial neural network with genetic feature selection. In: 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), pp. 414\u2013419, August 2016","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.32"},{"key":"17_CR19","unstructured":"Hodo, E., Bellekens, X.J.A., Hamilton, A., Tachtatzis, C., Atkinson, R.C.: Shallow and deep networks intrusion detection system: A taxonomy and survey. CoRR abs\/1701.02145 (2017)"},{"key":"17_CR20","volume-title":"Neural Networks: A Comprehensive Foundation","author":"S Haykin","year":"1998","unstructured":"Haykin, S.: Neural Networks: A Comprehensive Foundation, 2nd edn. Prentice Hall PTR, Upper Saddle River (1998)","edition":"2"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Simard, P.Y., Steinkraus, D., Platt, J.C.: Best practices for convolutional neural networks applied to visual document analysis. In. International Conference on Document Analysis and Recognition, pp. 958\u2013963 (2003)","DOI":"10.1109\/ICDAR.2003.1227801"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Gu, G., Fogla, P., Dagon, D., Lee, W., Skori\u0107, B.: Measuring intrusion detection capability: an information-theoretic approach. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 90\u2013101. ACM (2006)","DOI":"10.1145\/1128817.1128834"},{"issue":"1","key":"17_CR23","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., et al.: The weka data mining software: an update. ACM SIGKDD 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92639-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T00:59:21Z","timestamp":1751677161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-92639-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319926384","9783319926391"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92639-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Artificial Intelligence Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oviedo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hais2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/hais2018.uniovi.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}