{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:47:37Z","timestamp":1773082057403,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642143991","type":"print"},{"value":"9783642144004","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14400-4_50","type":"book-chapter","created":{"date-parts":[[2010,6,26]],"date-time":"2010-06-26T05:18:09Z","timestamp":1277529489000},"page":"643-652","source":"Crossref","is-referenced-by-count":9,"title":["Selection of Effective Network Parameters in Attacks for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Gholam Reza","family":"Zargar","sequence":"first","affiliation":[]},{"given":"Peyman","family":"Kabiri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","unstructured":"Ng, W.W.Y., Rocky, K.C., Chang, Daniel, Yeung, S.: Dimensionality Reduction for Denial of Service Detection Problems Using RBFNN Output Sensitivity. In: Proceedings of the Second International Conference on Machine Learning and Cybernetics, Wan, November 2-5 (2003)"},{"key":"50_CR2","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1162\/153244303322753616","volume":"3","author":"I. Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An Introduction to Variable and Feature Selection. J. Machine Learning Research\u00a03, 1157\u20131182 (2003)","journal-title":"J. Machine Learning Research"},{"issue":"3","key":"50_CR3","first-page":"196","volume":"4","author":"T.S. Chou","year":"2008","unstructured":"Chou, T.S., Yen, K.K., Luo, J.: Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms. J. Computational Intelligence\u00a04(3), 196\u2013208 (2008)","journal-title":"J. Computational Intelligence"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Sabahi, F., Movaghar, A.: Intrusion Detection: A Survey. In: 3rd international conference on system and network communication, ICSNC 2008, pp. 23\u201326 (2008)","DOI":"10.1109\/ICSNC.2008.44"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Zargar, G., Kabiri, P.: Identification of Effective Network Feature for Probing Attack Detection. In: First International Conference on Network Digital Technologies (NDT 2009), pp. 392\u2013397 (2009)","DOI":"10.1109\/NDT.2009.5272124"},{"issue":"4","key":"50_CR6","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S. Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., Thomas, J.: Feature Deduction and Ensemble Design of Intrusion Detection Systems. J. Computers and Security\u00a024(4), 295\u2013307 (2005)","journal-title":"J. Computers and Security"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: Identifying important features for intrusion detection using support vector machines and neural networks. In: International Symposium on Applications and the Internet (SAINT), pp. 209\u2013216 (2003)","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Gehrke, J., Gunopulos, D., Raghavan, P.: Automatic Subspace Clustering of High dimensional Data for Data Mining applications. In: ACMSIGMOD International Conference on Management of Data, Seattle, WA, pp. 94\u2013105 (1998)","DOI":"10.1145\/276304.276314"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: SAINT, pp. 209\u2013217 (2003)","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"50_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1007\/978-3-540-30502-6_34","volume-title":"Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making","author":"A.H. Sung","year":"2004","unstructured":"Sung, A.H., Mukkamala, S.: The Feature Selection and Intrusion Detection Problems. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol.\u00a03321, pp. 468\u2013482. Springer, Heidelberg (2004)"},{"key":"50_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/11604655","volume-title":"Feature Subset Selection by Neurorough Hybridization.","author":"B. Chakraborty","year":"2005","unstructured":"Chakraborty, B.: Feature Subset Selection by Neurorough Hybridization. LNCS, pp. 519\u2013526. Springer, Heidelberg (2005)"},{"issue":"7","key":"50_CR12","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1080\/0020754021000049844","volume":"41","author":"A. Hassan","year":"2003","unstructured":"Hassan, A., Nabi Baksh, M.S., Shaharoun, A.M., Jamaluddin, H.: Improved SPC Chart Pattern Recognition Using Statistical Feature. J. of Production Research\u00a041(7), 1587\u20131603 (2003)","journal-title":"J. of Production Research"},{"key":"50_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V. Vapnik","year":"1995","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, Heidelberg (1995)"},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Hassanzadeh, A., Sadeghian, B.: Intrusion Detection with Data Correlation Relation Graph. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 982\u2013989 (2008)","DOI":"10.1109\/ARES.2008.119"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Christopher, L., Schuba, V., Ivan, Krsul, et al.: Analysis of a denial of service attack on TCP. In: The IEEE Symposium on Security and Privacy, p. 208 (1997)","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"50_CR16","unstructured":"A Tutorial on Principal Component Analysis: Derivation, Discussion and Singular Value Decomposition, http:\/\/www.dgp.toronto.edu\/~aranjan\/tuts\/pca.pdf"},{"key":"50_CR17","unstructured":"Wang, W., Battiti, R.: Identifying Intrusions in Computer Networks based on Principal Component Analysis (2009), http:\/\/eprints.biblio.unitn.it\/archive\/00000917\/ (as visited on January 20, 2009)"},{"key":"50_CR18","volume-title":"Matrix Computation","author":"G.H. Golub","year":"1996","unstructured":"Golub, G.H., Van Loan, C.F.: Matrix Computation. Johns Hopkins Univ. Press, Baltimore (1996)"},{"key":"50_CR19","volume-title":"Principal Component Analysis","author":"I.T. Jolliffe","year":"2002","unstructured":"Jolliffe, I.T.: Principal Component Analysis, 2nd edn. Springer, NY (2002)","edition":"2"},{"key":"50_CR20","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2006)","edition":"2"},{"key":"50_CR21","unstructured":"http:\/\/www.wireshark.org (as visited on January 29, 2009)"},{"key":"50_CR22","unstructured":"Knowledge discovery in databases DARPA archive. Task Description, http:\/\/www.kdd.ics.uci.edu\/databases\/kddcup99\/task.html (as visited on January 15, 2009)"},{"key":"50_CR23","unstructured":"http:\/\/www.Tcpdump.org (as visited on January 28, 2009)"},{"key":"50_CR24","unstructured":"MIT Lincoln Laboratory, http:\/\/www.ll.mit.edu\/IST\/ideval\/ (as visited on January 27, 2009)"},{"key":"50_CR25","unstructured":"Lee, W.: A Data Mining Framework for Constructing Feature and Model for Intrusion Detection System. PhD thesis University of Columbia (1999)"},{"key":"50_CR26","unstructured":"http:\/\/www.wireshark.org\/docs\/man-ages\/editcap.html (as visited on January 20, 2009)"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14400-4_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T08:06:17Z","timestamp":1740211577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14400-4_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143991","9783642144004"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14400-4_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}