{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:17:46Z","timestamp":1745381866237,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346293"},{"type":"electronic","value":"9783642346309"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34630-9_55","type":"book-chapter","created":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T14:56:23Z","timestamp":1353682583000},"page":"536-543","source":"Crossref","is-referenced-by-count":3,"title":["Network Intrusion Detection Based on Multi-Class Support Vector Machine"],"prefix":"10.1007","author":[{"given":"Anh Vu","family":"Le","sequence":"first","affiliation":[]},{"given":"Hoai An","family":"Le Thi","sequence":"additional","affiliation":[]},{"given":"Manh Cuong","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Zidna","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"55_CR1","doi-asserted-by":"publisher","first-page":"259","DOI":"10.3844\/jcssp.2007.259.265","volume":"3","author":"M. Mehdi","year":"2007","unstructured":"Mehdi, M., Zair, S., Anou, A., Bensebti, M.: A Bayesian Networks in Intrusion Detection Systems. J. Computer Sci.\u00a03(5), 259\u2013265 (2007)","journal-title":"J. Computer Sci."},{"issue":"2","key":"55_CR2","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C.-W. Hsu","year":"2002","unstructured":"Hsu, C.-W., Lin, C.-J.: A Comparison of Methods for Multiclass Support Vector Machines. IEEE Transaction on Neural Networks\u00a013(2), 415\u2013427 (2002)","journal-title":"IEEE Transaction on Neural Networks"},{"issue":"1","key":"55_CR3","doi-asserted-by":"crossref","first-page":"73","DOI":"10.15388\/Informatica.2011.315","volume":"22","author":"Y. Guermuer","year":"2011","unstructured":"Guermuer, Y., Monfrini, E.: A Quadratic Loss Multi-Class SVM for which a Radius-Margin Bound Applies. Informatica\u00a022(1), 73\u201396 (2011)","journal-title":"Informatica"},{"key":"55_CR4","unstructured":"Hany, M., Harb, A.S.: Desuky: Adaboost Ensemble with Genetic Algorithm Post Optimization for Intrusion Detection. IJCSI\u00a08(5(1)), 28\u201333 (2011)"},{"key":"55_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1007\/11795131_78","volume-title":"Rough Sets and Knowledge Technology","author":"J. Yao","year":"2006","unstructured":"Yao, J., Zhao, S., Fan, L.: An Enhanced Support Vector Machine Model for Intrusion Detection. In: Wang, G.-Y., Peters, J.F., Skowron, A., Yao, Y. (eds.) RSKT 2006. LNCS (LNAI), vol.\u00a04062, pp. 538\u2013543. Springer, Heidelberg (2006)"},{"issue":"1","key":"55_CR6","doi-asserted-by":"publisher","first-page":"463","DOI":"10.4156\/ijact.vol4.issue1.52","volume":"4","author":"L. Yuping","year":"2012","unstructured":"Yuping, L., Weidong, L., Guoqiang, W.: An Intrusion Detection Approach Using SVM and Multiple Kernel Method. IJACT: International Journal of Advancements in Computing Technology\u00a04(1), 463\u2013469 (2012)","journal-title":"IJACT: International Journal of Advancements in Computing Technology"},{"issue":"2","key":"55_CR7","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/s100440200015","volume":"5","author":"Y. Guermeur","year":"2002","unstructured":"Guermeur, Y.: Combining discriminant models with new multi-class SVMs. Pattern Analysis and Applications (PAA)\u00a05(2), 168\u2013179 (2002)","journal-title":"Pattern Analysis and Applications (PAA)"},{"key":"55_CR8","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1613\/jair.3050","volume":"39","author":"J. Xu","year":"2010","unstructured":"Xu, J., Shelton, C.R.: Intrusion Detection using Continuous Time Bayesian Networks. Journal of Artificial Intelligence Research\u00a039, 745\u2013774 (2010)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"55_CR9","unstructured":"Guermeur, Y., Maumy, M., Sur, F.: Model selection for multi-class SVMs. In: ASMDA 2005, Brest, pp. 507\u2013517 (2005)"},{"key":"55_CR10","unstructured":"Weston, J., Watkins, C.: Multi-class support vector machines. In: Verleysen, M. (ed.) Presented at the Proc. ESANN 1999, Brussels, Belgium, pp. 1\u20139 (1999)"},{"key":"55_CR11","unstructured":"Cemerlic, A., Yang, L., Kizza, J.M.: Network Intrusion Detection Based on Bayesian Networks. In: Proceedings of SEKE, pp. 791\u2013794. Knowledge Systems Institute Graduate School (2008)"},{"key":"55_CR12","unstructured":"Mewada, A., Gedam, P., Khan, S., Udayapal Reddy, M.: Network Intrusion Detection Using Multiclass Support Vector Machine. Special Issue of IJCCT for International Conference (ACCTA 2010), vol.\u00a01(2,3,4), pp. 172\u2013175 (2010)"},{"issue":"12","key":"55_CR13","first-page":"258","volume":"7","author":"M. Panda","year":"2007","unstructured":"Panda, M., Patra, M.R.: Network Intrusion Detection using naive bayes. IJCSNS International Journal of Computer Science and Network Security\u00a07(12), 258\u2013263 (2007)","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"Wei, H., Weiming, H.: Network-Based Intrusion Detection Using Adaboost Algorithm. In: IEEE\/WIC\/ACM International Conference on Web Intelligence (WI 2005), pp. 712\u2013717 (2005)","DOI":"10.1109\/WI.2005.107"},{"key":"55_CR15","first-page":"265","volume":"2","author":"K. Crammer","year":"2001","unstructured":"Crammer, K., Singer, Y.: On the Algorithmic Implementation of Multiclass Kernel-based Vector Machines. Journal of Machine Learning Research\u00a02, 265\u2013292 (2001)","journal-title":"Journal of Machine Learning Research"},{"key":"55_CR16","unstructured":"Weston, J., Watkins, C.: Support Vector Machines for Multi-Class Pattern Recognition. In: ESANN 1999 Proceedings of European Symposium on Artificial Neural Networks Bruges, Bruges, Belgium, pp. 219\u2013224. D-Facto public (1999)"},{"key":"55_CR17","first-page":"379","volume":"18","author":"H. Zou","year":"2008","unstructured":"Zou, H., Yuan, M.: The F \u2009\u221e\u2009-norm support vector machine. Statistica Sinica\u00a018, 379\u2013398 (2008)","journal-title":"Statistica Sinica"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34630-9_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T16:55:08Z","timestamp":1745340908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34630-9_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346293","9783642346309"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34630-9_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}