{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:25:15Z","timestamp":1758709515832},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642274510"},{"type":"electronic","value":"9783642274527"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27452-7_59","type":"book-chapter","created":{"date-parts":[[2011,12,17]],"date-time":"2011-12-17T03:01:41Z","timestamp":1324090901000},"page":"434-440","source":"Crossref","is-referenced-by-count":1,"title":["New Method for Intrusion Detection Based on BPNN and Improved GA Optimization"],"prefix":"10.1007","author":[{"given":"Yuesheng","family":"Gu","sequence":"first","affiliation":[]},{"given":"Yanpei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","first-page":"1165","volume":"48","author":"X. Zhao","year":"2008","unstructured":"Zhao, X., Jing, R., Gu, M.: Adaptive intrusion detection algorithm based on rough sets. J. Tsinghua Univ. (Sci. & Tech.)\u00a048, 1165\u20131168 (2008)","journal-title":"J. Tsinghua Univ. (Sci. & Tech.)"},{"key":"59_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11804-011-1036-7","volume":"10","author":"Z. Li","year":"2011","unstructured":"Li, Z., Yan, X., Yuan, C., Zhao, J., Peng, Z.: Fault detection and diagnosis of the gearbox in marine propulsion system based on bispectrum analysis and artificial neural networks. Journal of Marine Science and Application\u00a010, 17\u201324 (2011)","journal-title":"Journal of Marine Science and Application"},{"key":"59_CR3","first-page":"110","volume":"27","author":"Z. Xie","year":"2010","unstructured":"Xie, Z.: Support vector machines based on genetic algorithm for network intrusion prediction. Journal of Computer Simulation\u00a027, 110\u2013113 (2010)","journal-title":"Journal of Computer Simulation"},{"key":"59_CR4","first-page":"1","volume":"20","author":"L. Qiao","year":"2006","unstructured":"Qiao, L., Peng, X., Ma, Y.: GA-SVM-Based feature subset selection algorithm. Journal of Electronic Measurement and Instrument\u00a020, 1\u20135 (2006)","journal-title":"Journal of Electronic Measurement and Instrument"},{"key":"59_CR5","first-page":"24","volume":"32","author":"W. Xiong","year":"2009","unstructured":"Xiong, W., Wang, C.: Hybrid feature transformation based on modified particle swarm optimization and support vector machine. Journal of Beijing University of Posts and Telecommunications\u00a032, 24\u201328 (2009)","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"key":"59_CR6","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1260\/0957-4565.41.10.76","volume":"41","author":"Z. Li","year":"2010","unstructured":"Li, Z., Yan, X., Yuan, C., Zhao, J., Peng, Z.: The fault diagnosis approach for gears using multidimensional features and intelligent classifier. Noise and Vibration Worldwide\u00a041, 76\u201386 (2010)","journal-title":"Noise and Vibration Worldwide"},{"key":"59_CR7","first-page":"46","volume":"45","author":"Z. Li","year":"2011","unstructured":"Li, Z., Yan, X.: Application of independent component analysis and manifold learning in fault diagnosis for VSC-HVDC systems. Hsi-An Chiao Tung Ta Hsueh\u00a045, 46\u201351 (2011)","journal-title":"Hsi-An Chiao Tung Ta Hsueh"},{"key":"59_CR8","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/TEVC.2002.804323","volume":"6","author":"C.w. Ahn","year":"2002","unstructured":"Ahn, C.w., Ramakrishna, R.: A genetic algorithm for shortest path routing problem and the sizing of populations. IEEE Transactions on Evolutionary Computation\u00a06, 566\u2013579 (2002)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"59_CR9","first-page":"1454","volume-title":"2010 International Conference on Computer Engineering and Technology","author":"F. Xiang","year":"2010","unstructured":"Xiang, F., Zheng, Z.: Research on complex electronic equipment fault location based on improved Genetic Algorithm. In: 2010 International Conference on Computer Engineering and Technology, pp. 1454\u20131457. IEEE Press, New York (2010)"},{"key":"59_CR10","first-page":"123","volume":"25","author":"Y. Zhang","year":"2005","unstructured":"Zhang, Y., Yang, X.: A fast genetie algorithm based on energy-entropy. Systems Engineering Theory and Practice\u00a025, 123\u2013128 (2005)","journal-title":"Systems Engineering Theory and Practice"},{"key":"59_CR11","doi-asserted-by":"publisher","first-page":"676","DOI":"10.4028\/www.scientific.net\/AMM.26-28.676","volume":"26","author":"Z. Huang","year":"2010","unstructured":"Huang, Z., Yu, Z., Li, Z., Geng, Y.: A fault diagnosis method of rolling bearing through wear particle and vibration analyses. Applied Mechanics and Materials\u00a026, 676\u2013681 (2010)","journal-title":"Applied Mechanics and Materials"},{"key":"59_CR12","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russell","year":"2003","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice Hall, Upper Saddle River (2003)"},{"key":"59_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-97966-8","volume-title":"Self-Organizing Maps","author":"T. Kohonen","year":"1997","unstructured":"Kohonen, T.: Self-Organizing Maps. Springler, Berlin (1997)"},{"key":"59_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/3-540-45853-0_16","volume-title":"Computer Security - ESORICS 2002","author":"S.-Y. Lee","year":"2002","unstructured":"Lee, S.-Y., Low, W.L., Wong, P.Y.: Learning Fingerprints for a Database Intrusion Detection System. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 264\u2013280. Springer, Heidelberg (2002)"},{"key":"59_CR15","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/3468.935046","volume":"31","author":"S.C. Lee","year":"2001","unstructured":"Lee, S.C., Heinbuch, D.V.: Training a neural network-based intrusion detector to recognize novel attacks. IEEE Trans. Systems, Man and Cybernetics Part A: Systems and Humans\u00a031, 294\u2013299 (2001)","journal-title":"IEEE Trans. Systems, Man and Cybernetics Part A: Systems and Humans"},{"key":"59_CR16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TR.2002.805796","volume":"52","author":"Y. Nong","year":"2003","unstructured":"Nong, Y., Vilbert, S., Chen, Q.: Computer intrusion detection through EWMA for auto correlated and uncorrelated data. IEEE Trans. Reliability\u00a052, 75\u201382 (2003)","journal-title":"IEEE Trans. Reliability"}],"container-title":["Communications in Computer and Information Science","Information Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27452-7_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T14:24:13Z","timestamp":1548512653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27452-7_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642274510","9783642274527"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27452-7_59","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}