{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:58:19Z","timestamp":1725530299375},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642011283"},{"type":"electronic","value":"9783642011290"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01129-0_11","type":"book-chapter","created":{"date-parts":[[2009,4,10]],"date-time":"2009-04-10T05:05:44Z","timestamp":1239339944000},"page":"93-98","source":"Crossref","is-referenced-by-count":8,"title":["Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming"],"prefix":"10.1007","author":[{"given":"Agustin","family":"Orfila","sequence":"first","affiliation":[]},{"given":"Juan M.","family":"Estevez-Tapiador","sequence":"additional","affiliation":[]},{"given":"Arturo","family":"Ribagorda","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"11_CR1","first-page":"328","volume":"4","author":"A. Abraham","year":"2007","unstructured":"Abraham, A., Grosan, C., Martin-Vide, C.: Evolutionary design of intrusion detection programs. International Journal of Network Security\u00a04(3), 328\u2013339 (2007)","journal-title":"International Journal of Network Security"},{"key":"11_CR2","unstructured":"Crosbie, M., Spafford, E.H.: Applying genetic programming to intrusion detection. In: Working Notes for the AAAI Symposium on GP (1995)"},{"key":"11_CR3","unstructured":"Elkan, C.: Results of the KDD 1999 classifier learning contest (September 1999), \n                    \n                      http:\/\/www-cse.ucsd.edu\/users\/elkan\/clresults.html"},{"issue":"3","key":"11_CR4","first-page":"237","volume":"4","author":"K. Faraoun","year":"2007","unstructured":"Faraoun, K., Boukelif, A.: Genetic programming approach for multi-category pattern classification applied to network intrusions detection. The International Arab Journal of Information Technology\u00a04(3), 237\u2013246 (2007)","journal-title":"The International Arab Journal of Information Technology"},{"key":"11_CR5","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"J.R. Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1016\/S1389-1286(00)00139-0","volume":"34","author":"R. Lippmann","year":"2000","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Computer Networks\u00a034(4), 579\u2013595 (2000)","journal-title":"Computer Networks"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-45248-5_13","volume-title":"Recent Advances in Intrusion Detection","author":"M.V. Mahoney","year":"2003","unstructured":"Mahoney, M.V., Chan, P.K.: An Analysis of the 1999 DARPA\/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 220\u2013237. Springer, Heidelberg (2003)"},{"key":"11_CR8","first-page":"1","volume-title":"Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, IMC 2005","author":"R. Pang","year":"2005","unstructured":"Pang, R., Allman, M., Bennett, M., Lee, J., Paxson, V., Tierney, B.: A first look at modern enterprise traffic. In: Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, IMC 2005, pp. 1\u201314. ACM, New York (2005)"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TEVC.2004.841683","volume":"9","author":"D. Song","year":"2005","unstructured":"Song, D., Heywood, M.I., Zincir-Heywood, A.N.: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Transactions on Evolutionary Computation\u00a09(3), 225\u2013239 (2005)","journal-title":"IEEE Transactions on Evolutionary Computation"}],"container-title":["Lecture Notes in Computer Science","Applications of Evolutionary Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01129-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T05:34:03Z","timestamp":1551936843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01129-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642011283","9783642011290"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01129-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}