{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T16:17:13Z","timestamp":1769444233744,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642255069","type":"print"},{"value":"9783642255076","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-25507-6_13","type":"book-chapter","created":{"date-parts":[[2012,2,10]],"date-time":"2012-02-10T11:30:44Z","timestamp":1328873444000},"page":"147-153","source":"Crossref","is-referenced-by-count":16,"title":["An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection"],"prefix":"10.1007","author":[{"given":"N.","family":"Jaisankar","sequence":"first","affiliation":[]},{"given":"S.","family":"Ganapathy","sequence":"additional","affiliation":[]},{"given":"P.","family":"Yogesh","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"K.","family":"Anand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,11]]},"reference":[{"issue":"6","key":"13_CR1","first-page":"1825","volume":"5","author":"D.H. Tang","year":"2009","unstructured":"Tang, D.H., Cao, Z.: Machine Learning-based Intrusion Detection Algorithms. Journal of Computational Information Systems\u00a05(6), 1825\u20131831 (2009)","journal-title":"Journal of Computational Information Systems"},{"key":"13_CR2","unstructured":"Lee, W., Stolfo, S.: Datamining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium (1998)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S. Peddabachigari","year":"2007","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion Detection system using hybrid In intelligent systems. Journal of Network and Computer Applications\u00a030, 114\u2013132 (2007)","journal-title":"Journal of Network and Computer Applications"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Sun, S., Wang, Y.: A Weighted Support Vector Clustering Algorithm and its Application In Network Intrusion Detection. In: First International Workshop on Education Technology and Computer Science, vol.\u00a01, pp. 352\u2013355 (2009)","DOI":"10.1109\/ETCS.2009.88"},{"issue":"5","key":"13_CR5","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1109\/TFUZZ.2006.889960","volume":"16","author":"E.C.C. Tsang","year":"2008","unstructured":"Tsang, E.C.C., Chen, D., Yeung, D.S.: Attributes Reduction using Fuzzy Rough Sets. IEEE Transaction on Fuzzy Systems\u00a016(5), 1130\u20131140 (2008)","journal-title":"IEEE Transaction on Fuzzy Systems"},{"key":"13_CR6","unstructured":"Jensen, R., Quiang: Fuzzy Rough Attribute Reduction with Application to Web Categorization, vol.\u00a022 (Febraury 2008)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Angiulli, F., Basta, S., Pizzuti, C.: Distance based Detection and prediction of Outliers. IEEE Transactions on Knowledge and Data Engineering\u00a018(2) (Febraury 2006)","DOI":"10.1109\/TKDE.2006.29"},{"key":"13_CR8","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/IDA-2009-0363","volume":"13","author":"F. Shaari","year":"2009","unstructured":"Shaari, F., Bakar, A.A., Hamdan, A.R.: Outlier Detection Based on Rough Sets Theory. Intelligence Data Analysis\u00a0(13), 191\u2013206 (2009)","journal-title":"Intelligence Data Analysis"},{"issue":"2-3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1080\/03081079008935107","volume":"17","author":"D. Dubois","year":"1990","unstructured":"Dubois, D., Prade, H.: Rough fuzzy sets and fuzzy rough sets. International Journal of General Systems\u00a017(2-3), 191\u2013209 (1990)","journal-title":"International Journal of General Systems"},{"issue":"5","key":"13_CR10","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z. Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough Sets. International Journal of Computer and Information Sciences\u00a011(5), 341\u2013356 (1982)","journal-title":"International Journal of Computer and Information Sciences"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.fss.2009.04.007","volume":"161","author":"D. Chen","year":"2010","unstructured":"Chen, D., He, Q., Wang, X.: FrSVMs: Fuzzy rough set based Support Vector Machinie. Fuzzy Sets and Systems\u00a0161, 596\u2013607 (2010)","journal-title":"Fuzzy Sets and Systems"},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/09685221011079199","volume":"18","author":"A. Patel","year":"2010","unstructured":"Patel, A., Qassim, Q., Wills, C.: A survey of intrusion detection and prevention systems. Information Management & Computer Security\u00a018(4), 277\u2013290 (2010)","journal-title":"Information Management & Computer Security"},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.patcog.2009.05.017","volume":"43","author":"C.-F. Tsai","year":"2010","unstructured":"Tsai, C.-F., Lin, C.-Y.: A Triangle area based nearest neighbors approach to Intrusion Detection. Pattern Recognition\u00a043(1), 222\u2013229 (2010)","journal-title":"Pattern Recognition"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Mohammadreza, E., Sara, M., Fatinah, S., Lilly Suriani, A.: Intrusion Detection using Data Mining Techniques. In: IEEE International Conference on Information Retrievel and Knowledge Management (CAMP), pp. 200\u2013203 (2010)","DOI":"10.1109\/INFRKM.2010.5466919"}],"container-title":["Studies in Computational Intelligence","Soft Computing Techniques in Vision Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25507-6_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T09:54:10Z","timestamp":1742464450000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25507-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642255069","9783642255076"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25507-6_13","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}