{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:38Z","timestamp":1725550898625},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_17","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"96-101","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Intrusion Detection with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison"],"prefix":"10.1007","author":[{"given":"B.","family":"Kavitha","sequence":"first","affiliation":[]},{"given":"S.","family":"Karthikeyan","sequence":"additional","affiliation":[]},{"given":"B.","family":"Chitra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"KDDCup99datasets, The UCI KDD Archive, \n                  \n                    http:\/\/kdd.ics.ucs.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"17_CR2","unstructured":"Peng, T., Zuo, W.: Data Mining for Network Intrusion Detection System in Real Time. Journal of Computer Science and Network Security\u00a06(2), 173\u2013177"},{"key":"17_CR3","unstructured":"Hybrid Model. International Journal of Computer Science and Network Security\u00a09(10), 23\u201333 (October 2009)"},{"issue":"7","key":"17_CR4","first-page":"319","volume":"8","author":"G.V.S.N.R.V. Prasad","year":"2008","unstructured":"Prasad, G.V.S.N.R.V., Dhanalakshmi, Y., Vijaya Kumar, V., Ramesh Babu, I.: Modeling. Modeling An Intrusion Detection System Using Data Mining and Genetic Algorithms Based on Fuzzy Logic\u00a08(7), 319\u2013325 (2008)","journal-title":"Modeling An Intrusion Detection System Using Data Mining and Genetic Algorithms Based on Fuzzy Logic"},{"key":"17_CR5","unstructured":"Panda, M., Patra, M.R.: A Comparative Study of Clustering Algorithms for Building a Network Intrusion Detection Model. Journal of Computer Science"},{"key":"17_CR6","unstructured":"MIT Lincoln Lab., Information Systems Technology Group, The 1998 Intrusion detection off-line evaluation plan (March 25, 1998 )"},{"key":"17_CR7","unstructured":"WEKA: Data Mining Software in Java (2008), \n                  \n                    http:\/\/www.cs.waikata.ac.nz\/ml\/weka"},{"key":"17_CR8","unstructured":"J48 classifier, \n                  \n                    http:\/\/www.d.umn.edu\/~padhy005\/Chapter5.html"},{"key":"17_CR9","unstructured":"Zhang, H.: The Optimality of Naive Bayes. In: FLAIRS 2004 conference (2004), \n                  \n                    http:\/\/www.resample.com\/xlminer\/help\/NaiveBC\/classiNB_intro.htm"},{"key":"17_CR10","unstructured":"Ross, P.: OneR: the simplest method"},{"key":"17_CR11","unstructured":"ROC Signal detection theory and ROC analysis in psychology and diagnostics\u00a0: collected papers; Swets (1996)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:05:56Z","timestamp":1619784356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}