{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:15:30Z","timestamp":1725560130923},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220091"},{"type":"electronic","value":"9783540246817"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24681-7_10","type":"book-chapter","created":{"date-parts":[[2010,7,25]],"date-time":"2010-07-25T13:06:03Z","timestamp":1280063163000},"page":"74-83","source":"Crossref","is-referenced-by-count":5,"title":["Attribute Reduction for Effective Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Fernando","family":"God\u00ednez","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Hutter","sequence":"additional","affiliation":[]},{"given":"Ra\u00fal","family":"Monroy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Kim, J., Bentley, P.: The Human Immune System and Network Intrusion Detection. In: Proceedings of the 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT 1999), Aachen, Germany. ELITE Foundation (1999)"},{"key":"10_CR2","unstructured":"Sun MicroSystems: SunSHIELD Basic Security Module Guide. Part number 806- 1789-10 edn. (2000)"},{"key":"10_CR3","unstructured":"Haines, J.W., Lippmann, R.P., Fried, D.J., Tran, E., Boswell, S., Zissman, M.A.: 1999 DARPA intrusion detection system evaluation: Design and procedures. Technical Report 1062, Lincoln Laboratory. MIT (2001)"},{"key":"10_CR4","volume-title":"Machine Learning: An artificial intelligence approach","author":"J.R. Quinlan","year":"1983","unstructured":"Quinlan, J.R.: Learning efficient classification procedures and their application to chess and games. In: Machine Learning: An artificial intelligence approach, Springer, Palo Alto (1983)"},{"key":"10_CR5","series-title":"Statistics-Probability Series","volume-title":"Classification and Regresion Trees","author":"L. Breiman","year":"1984","unstructured":"Breiman, L., Stone, C.J., Olshen, R.A., Friedman, J.H.: Classification and Regresion Trees. Statistics-Probability Series. Brooks\/Cole, Monterey (1984)"},{"key":"10_CR6","volume-title":"Rough- Fuzzy Hybridization: A New Method for Decision Making","author":"J. Komorowski","year":"1998","unstructured":"Komorowski, J., Polkowski, L., Skowron, A.: Rough sets: A tutorial. In: Rough- Fuzzy Hybridization: A New Method for Decision Making, Springer, Heidelberg (1998)"},{"key":"10_CR7","unstructured":"Axelsson, S.: Aspects of the modelling and performance of intrusion detection. Department of Computer Engineering, Chalmers University of Technology (2000) (Thesis for the degree of Licentiate of Engineering)"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal Sequence Learning and Data Reduction for Anomaly Detection. ACM Transactions on Information and System Security\u00a02, 295\u2013331 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"10_CR9","first-page":"519","volume-title":"Proceedings of the 17th International Conference on Machine Learning","author":"T. Lane","year":"2000","unstructured":"Lane, T., Brodley, C.E.: Data Reduction Techniques for Instance-Based Learning from Human\/Computer Interface Data. In: Proceedings of the 17th International Conference on Machine Learning, pp. 519\u2013526. Morgan Kaufmann, San Francisco (2000)"},{"key":"10_CR10","unstructured":"Knop, M.W., Schopf, J.M., Dinda, P.A.: Windows performance monitoring and data reduction using watchtower and argus. Technical Report Technical Report NWU-CS-01-6, Department of Computer Science, Northwestern University (2001)"},{"key":"10_CR11","volume-title":"Methods in Multivariate Analysis","author":"A. Rencher","year":"1995","unstructured":"Rencher, A.: Methods in Multivariate Analysis. Wiley & Sons, New York (1995)"},{"key":"10_CR12","volume-title":"Proc. of DARPA Information Survivability Conference and Exposition","author":"J.A. Marin","year":"2001","unstructured":"Marin, J.A., Ragsdale, D., Surdu, J.: A hybrid approach to profile creation and intrusion detection. In: Proc. of DARPA Information Survivability Conference and Exposition, IEEE Computer Society, Los Alamitos (2001)"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/S0022-0000(74)80044-9","volume":"9","author":"D.S. Johnson","year":"1974","unstructured":"Johnson, D.S.: Approximation algorithms for combinatorial problems. Journal of Computer and System Sciences\u00a09, 256\u2013278 (1974)","journal-title":"Journal of Computer and System Sciences"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0888-613X(00)00051-7","volume":"25","author":"S. Viterbo","year":"2000","unstructured":"Viterbo, S., \u00d8hrn, A.: Minimal approximate hitting sets and rule templates. International Journal of Approximate Reasoning\u00a025, 123\u2013143 (2000)","journal-title":"International Journal of Approximate Reasoning"},{"key":"10_CR15","unstructured":"\u00d8hrn, A., Komorowski, J.: ROSETTA: A Rough Set Toolkit for Analysis of Data. In: Wong, P. (ed.) Proceedings of the Third International Joint Conference on Information Sciences, Durham, NC, USA. Department of Electrical and Computer Engineering, vol.\u00a03, pp. 403\u2013407. Duke University (1997)"}],"container-title":["Lecture Notes in Computer Science","Advances in Web Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24681-7_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:53:55Z","timestamp":1605761635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24681-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220091","9783540246817"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24681-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}