{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:23:18Z","timestamp":1725492198723},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540714408"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71441-5_72","type":"book-chapter","created":{"date-parts":[[2007,7,5]],"date-time":"2007-07-05T17:14:41Z","timestamp":1183655681000},"page":"666-673","source":"Crossref","is-referenced-by-count":6,"title":["A PSO-Based Approach to Rule Learning in Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Chen","family":"Guolong","sequence":"first","affiliation":[]},{"given":"Chen","family":"Qingliang","sequence":"additional","affiliation":[]},{"given":"Guo","family":"Wenzhong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"72_CR1","doi-asserted-by":"crossref","unstructured":"Bace, R., Mell, P.: Intrusion detection systems. NIST Computer Science Special Reports November SP800-31 (2001)","DOI":"10.6028\/NIST.SP.800-31"},{"key":"72_CR2","volume-title":"Network Intrusion Detection","author":"S. Northcutt","year":"2003","unstructured":"Northcutt, S., Novak, J.: Network Intrusion Detection, 3rd edn. New Riders, Indianapolis (2003)","edition":"3"},{"key":"72_CR3","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security","author":"D. Dasgupta","year":"2001","unstructured":"Dasgupta, D., Gonzalez, F.A.: An Intelligent Decision Support System for Intrusion Detection and Response. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.\u00a02052, pp. 1\u201314. Springer, Heidelberg (2001)"},{"key":"72_CR4","unstructured":"Chittur, A.: Model Generation for an Intrusion Detection System Using Genetic Algorithms. http:\/\/www1.cs.columbia.edu\/ids\/publications\/gaids-thesis01.pdf"},{"key":"72_CR5","doi-asserted-by":"crossref","unstructured":"Guan, J., Liu, D., Cui, B.: An Induction Learning Approach for Building Intrusion Detection Models Using Genetic Algorithms. In: Proceedings of the 5th World Congress on Intelligent Control and Automation. Hangzhou, P.R. China, pp. 15\u201319 (2004)","DOI":"10.1109\/WCICA.2004.1342332"},{"key":"72_CR6","volume-title":"Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC \u201905)","author":"T. Xiao","year":"2005","unstructured":"Xiao, T., et al.: An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm. In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC \u201905), Phoenix, AZ, USA, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"72_CR7","unstructured":"Bridges, S.M., Vaughn, R.B.: Fuzzy Data Mining And Genetic Algorithms Applied to Intrusion Detection. In: Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109\u2013122 (2000)"},{"key":"72_CR8","unstructured":"Abadeh, M.S., Habibi, J., Aliari, S.: Using a Particle Swarm Optimization Approach for Evolutionary Fuzzy Rule Learning: A Case Study of Intrusion Detection. In: IPMU (2006)"},{"key":"72_CR9","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/ICNN.1995.488968","volume-title":"Proceedings of the IEEE Int. Conf. Neural Networks","author":"J. Kennedy","year":"1995","unstructured":"Kennedy, J., Eberhart, R.C.: Particle Swarm Optimization. In: Proceedings of the IEEE Int. Conf. Neural Networks, pp. 1942\u20131948. IEEE Computer Society Press, Los Alamitos (1995)"},{"key":"72_CR10","unstructured":"Parsopoulos, K.E., et al.: Streching Technique for Obtaining Gloabal Minimizers Through Particle Swarm Optimization. In: Proceedings Particle Swarm Optimization Workshop, pp. 22\u201329 (2001)"},{"key":"72_CR11","first-page":"94","volume-title":"Proceedings of the IEEE congress on Evolutionary Computation","author":"R.C. Eberhart","year":"2001","unstructured":"Eberhart, R.C., Shi, Y.H.: Tracking and optimizing dynamic systems with particle swarms. In: Proceedings of the IEEE congress on Evolutionary Computation, Seoul, Korea, pp. 94\u201397. IEEE, Los Alamitos (2001)"},{"key":"72_CR12","first-page":"69","volume-title":"IEEE International Conference of Evolutionary Computation","author":"Y.H. Shi","year":"1998","unstructured":"Shi, Y.H., Eberhart, R.C.: A Modified Particle Swarm Optimizer. In: IEEE International Conference of Evolutionary Computation, pp. 69\u201373. IEEE Computer Society Press, Piscataway (1998)"},{"key":"72_CR13","unstructured":"Sousa, T., Silva, A., Neves, A.: A Particle Swarm Data Miner: http:\/\/cisuc.dei.uc.pt\/_binaries\/615_pub_TiagoEPIA03.pdf"},{"key":"72_CR14","unstructured":"KDD Cup competition (1999), http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"issue":"20","key":"72_CR15","first-page":"107","volume":"31","author":"X. Duan","year":"2005","unstructured":"Duan, X., Wang, C., Wang, N., et al.: Design of Classifier Based on Particle Swarm Algorithm. Computer Engineering, China\u00a031(20), 107\u2013109 (2005)","journal-title":"Computer Engineering, China"},{"key":"72_CR16","unstructured":"IP, Internet Protocol: http:\/\/www.networksorcery.com\/enp\/protocol\/ip.htm"},{"key":"72_CR17","unstructured":"Port Numbers: http:\/\/www.iana.org\/assignments\/port-numbers"}],"container-title":["Advances in Soft Computing","Fuzzy Information and Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71441-5_72.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:20:46Z","timestamp":1605763246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71441-5_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540714408"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71441-5_72","relation":{},"subject":[]}}