{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:55:54Z","timestamp":1725897354953},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309755"},{"type":"electronic","value":"9783642309762"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30976-2_47","type":"book-chapter","created":{"date-parts":[[2012,6,12]],"date-time":"2012-06-12T12:58:11Z","timestamp":1339505891000},"page":"390-397","source":"Crossref","is-referenced-by-count":6,"title":["The Application of Genetic Algorithm to Intrusion Detection in MP2P Network"],"prefix":"10.1007","author":[{"given":"Lu","family":"Li","sequence":"first","affiliation":[]},{"given":"Guoyin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinyuan","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Yingjiao","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Aihong","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"47_CR1","doi-asserted-by":"publisher","first-page":"404","DOI":"10.3724\/SP.J.1001.2008.00404","volume":"19","author":"Z. Ou","year":"2008","unstructured":"Ou, Z., Song, M., et al.: Key techniques for Mobile Peer-to-Peer Networks. Journal of Software\u00a019(2), 404\u2013418 (2008)","journal-title":"Journal of Software"},{"issue":"4","key":"47_CR2","first-page":"86","volume":"29","author":"J.J. Cheng","year":"2006","unstructured":"Cheng, J.J., Li, Y.H., Cheng, S.D., et al.: The architecture on the mobile P2P system and the study for the key technology. Journal of Beijing University of Posts and Telecommunications\u00a029(4), 86\u201389 (2006)","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"issue":"1","key":"47_CR3","first-page":"106","volume":"29","author":"X. Zhu","year":"2001","unstructured":"Zhu, X., Chen, D., et al.: Pareto Multi objective Genetic Algorithm with Multiple-Chromosomes Crossover. Acta Electronica Sinica\u00a029(1), 106\u2013109 (2001)","journal-title":"Acta Electronica Sinica"},{"issue":"7","key":"47_CR4","first-page":"19","volume":"25","author":"H. Qing","year":"2004","unstructured":"Qing, H., Jiang, J., et al.: Research on intrusion detection techniques. Journal of China Institute of Communications\u00a025(7), 19\u201329 (2004)","journal-title":"Journal of China Institute of Communications"},{"issue":"1","key":"47_CR5","first-page":"96","volume":"9","author":"J.B.D. Cabrera","year":"2008","unstructured":"Cabrera, J.B.D., Gutierrez, C., Mehra, R.K.: Ensemble method for anomaly detection and distributed intrusion detection in mobile. Ad Hoc Networks\u00a09(1), 96\u2013119 (2008)","journal-title":"Ad Hoc Networks"},{"unstructured":"Tang, Z., et al.: The design and implementation of network intrusion detection, pp. 2\u201310. Electronic Industry Press (2002)","key":"47_CR6"},{"key":"47_CR7","doi-asserted-by":"crossref","first-page":"20","DOI":"10.7551\/mitpress\/1090.001.0001","volume-title":"Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence","author":"J.H. Holland","year":"1992","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence, pp. 20\u201335. MIT Press, Cambridge (1992)"},{"unstructured":"Pillai, M.M., et al.: An approach to implement a network intrusion detection system using genetic algorithms. In: Proceedings of the Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists (2004)","key":"47_CR8"},{"unstructured":"KDD Cup Data (2006), \n                    \n                      http:\/\/kdd.ics.uci.edu\/","key":"47_CR9"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30976-2_47.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:37:36Z","timestamp":1620113856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30976-2_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309755","9783642309762"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30976-2_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}