{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:51:09Z","timestamp":1725583869282},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215001"},{"type":"electronic","value":"9783642215018"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21501-8_10","type":"book-chapter","created":{"date-parts":[[2011,5,30]],"date-time":"2011-05-30T09:45:30Z","timestamp":1306748730000},"page":"73-80","source":"Crossref","is-referenced-by-count":3,"title":["A Multi-Objective Evolutionary Algorithm for Network Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"J.","family":"G\u00f3mez","sequence":"first","affiliation":[]},{"given":"C.","family":"Gil","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ba\u00f1os","sequence":"additional","affiliation":[]},{"given":"A. L.","family":"M\u00e1rquez","sequence":"additional","affiliation":[]},{"given":"F. G.","family":"Montoya","sequence":"additional","affiliation":[]},{"given":"M. G.","family":"Montoya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level network intrusion detection system. Technical report CS90-20, Department of Computer Science, University of New Mexico (1990)","DOI":"10.2172\/425295"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Beale, J., Baker, A., Caswell, B., Alder, R., Poore, M.: Snort 2.1 Intrusion detection, 2nd edn. (2004)","DOI":"10.1016\/B978-193183604-3\/50006-0"},{"key":"10_CR3","volume-title":"Network Security Monitor (NSM) - Final Report","author":"L.T. Heberlein","year":"1995","unstructured":"Heberlein, L.T.: Network Security Monitor (NSM) - Final Report. Lawrence Livermore National Laboratory, Davis (1995)"},{"key":"10_CR4","unstructured":"Lawrence Livermore National Laboratory: Network Intrusion Detector (NID). Overview. Computer Security Technology Center (1998)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-642-02481-8_75","volume-title":"Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living","author":"J. G\u00f3mez","year":"2009","unstructured":"G\u00f3mez, J., Gil, C., Padilla, N., Ba\u00f1os, R., Jim\u00e9nez, C.: Design of a snort-based hybrid intrusion detection system. In: Omatu, S., Rocha, M.P., Bravo, J., Fern\u00e1ndez, F., Corchado, E., Bustillo, A., Corchado, J.M. (eds.) IWANN 2009. LNCS, vol.\u00a05518, pp. 515\u2013522. Springer, Heidelberg (2009)"},{"key":"10_CR6","volume-title":"Evolutionary computation: a unified approach","author":"K.A. Jong De","year":"2006","unstructured":"De Jong, K.A.: Evolutionary computation: a unified approach. MIT Press, Cambridge (2006)"},{"key":"10_CR7","volume-title":"Genetic algorithms in search, optimization and machine learning","author":"D. Goldberg","year":"1989","unstructured":"Goldberg, D.: Genetic algorithms in search, optimization and machine learning. Addison Wesley, New York (1989)"},{"key":"10_CR8","unstructured":"Anchor, K.P., Zydallis, J.B., Gunsch, G.H., Lamont, G.B.: Extending the Computer Defense Immune System: network intrusion detection with a multiobjective evolutionary programming approach. In: Timmis, Bentley (eds.) First International Conference on Artificial Immune Systems (ICARIS 2002), Canterbury, UK, pp. 12\u201321 (2002)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Haag, C.R., Lamont, G.B., Williams, P.D., Peterson, G.L.: An artificial immune system-inspired multiobjective evolutionary algorithm with application to the detection of distributed computer network intrusions. In: Genetic And Evolutionary Computation Conference (GECCO), pp. 2717\u20132724 (2007)","DOI":"10.1145\/1274000.1274035"},{"key":"10_CR10","unstructured":"DARPA, Intrusion detection evaluation data sets (2002), http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/index.html"},{"key":"10_CR11","unstructured":"Wu-Ftpd file globbing heap corruption vulnerability, CVE-2001-0550, http:\/\/www.securityfocus.com\/bid\/3581\/info"},{"issue":"4","key":"10_CR12","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/4235.797969","volume":"3","author":"E. Zitzler","year":"1999","unstructured":"Zitzler, E., Thiele, L.: Multiobjective evolutionary algorithms: a comparative case study and the Strength Pareto approach. IEEE Transactions on Evolutionary Computation\u00a03(4), 257\u2013271 (1999)","journal-title":"IEEE Transactions on Evolutionary Computation"}],"container-title":["Lecture Notes in Computer Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21501-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T08:48:38Z","timestamp":1560242918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21501-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215001","9783642215018"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21501-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}