{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:56Z","timestamp":1725520676366},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_19","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T11:31:09Z","timestamp":1224502269000},"page":"147-154","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Zorana","family":"Bankovi\u0107","sequence":"first","affiliation":[]},{"given":"Slobodan","family":"Bojani\u0107","sequence":"additional","affiliation":[]},{"given":"Octavio","family":"Nieto-Taladriz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Bankovi\u0107, Z., Stepanovi\u0107, D., Bojani\u0107, S., Nieto-Taladriz, O.: Improving Network Security Using Genetic Algorithm Approach. Computers & Electrical Engineering\u00a033(5-6), 438\u2013451","key":"19_CR1","DOI":"10.1016\/j.compeleceng.2007.05.010"},{"unstructured":"Grosan, C., Abraham, A., Chis, M.: Computational Intelligence for light weight intrusion detection systems. In: International Conference on Applied Computing (IADIS 2006), San Sebastian, Spain, pp. 538\u2013542 (2006); ISBN: 9728924097","key":"19_CR2"},{"unstructured":"Gong, R.H., Zulkernine, M., Abolmaesumi, P.: A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection. In: Proceedings of SNPD\/SAWN 2005 (2005)","key":"19_CR3"},{"unstructured":"Chittur, A.: Model Generation for an Intrusion Detection System Using Genetic Algorithms (accessed in 2006), http:\/\/www1.cs.columbia.edu\/ids\/publications\/gaids-thesis01.pdf","key":"19_CR4"},{"issue":"1","key":"19_CR5","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1007730.1007734","volume":"6","author":"G. Weiss","year":"2004","unstructured":"Weiss, G.: Mining with rarity: A unifying framework. SIGKDD Explorations\u00a06(1), 7\u201319 (2004)","journal-title":"SIGKDD Explorations"},{"unstructured":"http:\/\/kdd.ics.uci.edu\/ (October 1999)","key":"19_CR6"},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA IDS Evaluation as Performed by Lincoln Laboratory. ACM Trans. on Information and System security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Trans. on Information and System security"},{"doi-asserted-by":"crossref","unstructured":"Bouzida, Y., Cuppens, F.: Detecting known and novel network intrusion. In: IFIP\/SEC 2006 21st International Information Security Conference, Karlstad, Sweden (2006)","key":"19_CR8","DOI":"10.1007\/0-387-33406-8_22"},{"key":"19_CR9","volume-title":"Genetic algorithms for search, optimization, and machine learning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic algorithms for search, optimization, and machine learning. Addison-Wesley, Reading (1989)"},{"unstructured":"GAlib, A.: C++ Library of Genetic Algorithm Components, http:\/\/lancet.mit.edu\/ga\/","key":"19_CR10"},{"unstructured":"Pan, Z., Chen, S., Hu, G., Zhang, D.: Hybrid Neural Network and C4.5 for Misuse Detection. In: Proceedings of the Second International Conference on Machine Learning and Cybernetics, November 2003, vol.\u00a04, pp. 2463\u20132467 (2003)","key":"19_CR11"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11551188_6","volume-title":"Pattern Recognition and Data Mining","author":"G. Folino","year":"2005","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: GP Ensemble for Distributed Intrusion Detection Systems. In: Singh, S., Singh, M., Apte, C., Perner, P. (eds.) ICAPR 2005. LNCS, vol.\u00a03686. Springer, Heidelberg (2005)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/11553595_6","volume-title":"Image Analysis and Processing \u2013 ICIAP 2005","author":"P. Laskov","year":"2005","unstructured":"Laskov, P., D\u00fcssel, P., Sch\u00e4fer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsaupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol.\u00a03617, pp. 50\u201357. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Yao, J.T., Zhao, S.L., Saxton, L.V.: A Study on Fuzzy Intrusion Detection. Data mining, intrusion detection, information assurance and data networks security (2005)","key":"19_CR14","DOI":"10.1117\/12.604465"},{"doi-asserted-by":"crossref","unstructured":"Chawla, N.V., Lazarevic, A., Hall, L.O., Bowyer, K.: SMOTEBoost: Improving prediction of the minority class in boosting. In: Proceedings of Principles of Knowledge Discovery in Databases (2003)","key":"19_CR15","DOI":"10.1007\/978-3-540-39804-2_12"},{"unstructured":"Fodor, I.K.: A Survey of Dimension Reduction Techniques, http:\/\/llnl.gov\/CASC\/sapphire\/pubs","key":"19_CR16"}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:56:59Z","timestamp":1619524619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_19","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}