{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T11:53:25Z","timestamp":1764330805594},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_19","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T05:14:43Z","timestamp":1281503683000},"page":"242-255","source":"Crossref","is-referenced-by-count":20,"title":["A Comparison of Feature-Selection Methods for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Hai Thanh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Slobodan","family":"Petrovi\u0107","sequence":"additional","affiliation":[]},{"given":"Katrin","family":"Franke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Hall, M.: Correlation Based Feature Selection for Machine Learning. In: Doctoral dissertation. Department of Computer Science, University of Waikato (1999)","key":"19_CR1"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TPAMI.2005.159","volume":"27","author":"H. Peng","year":"2005","unstructured":"Peng, H., Long, F., Ding, C.: Feature Selection Based on Mutual Information: Criteria of Max-Dependency, Max-Relevance, and Min-Redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence\u00a027, 1226\u20131238 (2005)","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"unstructured":"Weka, the Data Mining Software in Java, \n                    \n                      http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/","key":"19_CR3"},{"key":"19_CR4","series-title":"Studies in Fuzziness and Soft Computing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35488-8","volume-title":"Feature Extraction: Foundations and Applications","author":"I. Guyon","year":"2006","unstructured":"Guyon, I., Gunn, S., Nikravesh, M., Zadeh, L.A.: Feature Extraction: Foundations and Applications. Studies in Fuzziness and Soft Computing. Springer, Heidelberg (2006)"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/S0377-2217(00)00097-7","volume":"131","author":"C.T. Chang","year":"2001","unstructured":"Chang, C.T.: On the Polynomial Mixed 0-1 Fractional Programming Problems. European Journal of Operational Research\u00a0131, 224\u2013227 (2001)","journal-title":"European Journal of Operational Research"},{"unstructured":"TOMLAB, The Optimization Environment in MATLAB, \n                    \n                      http:\/\/tomopt.com\/","key":"19_CR6"},{"unstructured":"KDD Cup 1999 Data Set (1999), \n                    \n                      http:\/\/www.sigkdd.org\/kddcup\/index.php?section=1999&method=data","key":"19_CR7"},{"unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)","key":"19_CR8"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/11863908_32","volume-title":"Computer Security \u2013 ESORICS 2006","author":"G. Gu","year":"2006","unstructured":"Gu, G., Fogla, P., Dagon, D., Lee, W., Skoric, B.: Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 527\u2013546. Springer, Heidelberg (2006)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/11555827_16","volume-title":"Computer Security \u2013 ESORICS 2005","author":"G.D. Crescenzo","year":"2005","unstructured":"Crescenzo, G.D., Ghosh, A., Talpade, R.: Towards a Theory of Intrusion Detection. In: Capitani, S., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 267\u2013286. Springer, Heidelberg (2005)"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/ARES.2010.70","volume-title":"International Conference on Availability, Reliability and Security (ARES)","author":"H. Nguyen","year":"2010","unstructured":"Nguyen, H., Franke, K., Petrovi\u0107, S.: Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. In: International Conference on Availability, Reliability and Security (ARES), pp. 17\u201324. IEEE Press, New York (2010)"},{"unstructured":"Nguyen, H., Franke, K., Petrovi\u0107, S.: Optimizing a Class of Feature Selection Measures. In: NIPS 2009 Workshop on Discrete Optimization in Machine Learning: Submodularity, Sparsity & Polyhedra (DISCML), Vancouver, Canada (2009)","key":"19_CR12"},{"key":"19_CR13","first-page":"209","volume-title":"International Symposium on Applications and the Internet (SAINT)","author":"A.H. Sung","year":"2003","unstructured":"Sung, A.H., Mukkamala, S.: Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. In: International Symposium on Applications and the Internet (SAINT), pp. 209\u2013217. IEEE Press, Los Alamitos (2003)"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"4","author":"S. Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., Thomas, J.: Feature Deduction and Ensemble Design of Intrusion Detection Systems. Computers & Security\u00a04, 295\u2013307 (2005)","journal-title":"Computers & Security"},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM TISSEC\u00a03, 262\u2013294 (2000)","journal-title":"ACM TISSEC"},{"key":"19_CR16","doi-asserted-by":"crossref","first-page":"403","DOI":"10.3233\/IDA-2004-8406","volume":"8","author":"M. Sabhnani","year":"2004","unstructured":"Sabhnani, M., Serpen, G.: Why Machine Learning Algorithms Fail in Misuse Detection on KDD Intrusion Detection Data Set. Intelligent Data Analysis\u00a08, 403\u2013415 (2004)","journal-title":"Intelligent Data Analysis"},{"key":"19_CR17","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley& Sons, New York (2001)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11937807_13","volume-title":"Information Security and Cryptology","author":"Y. Chen","year":"2006","unstructured":"Chen, Y., Li, Y., Cheng, X.Q., Guo, L.: Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol.\u00a04318, pp. 153\u2013167. Springer, Heidelberg (2006)"},{"key":"19_CR19","volume-title":"Computational Methods of Feature Selection","author":"H. Liu","year":"2008","unstructured":"Liu, H., Motoda, H.: Computational Methods of Feature Selection. Chapman & Hall\/CRC, Boca Raton (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:36:32Z","timestamp":1619771792000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}