{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:35:24Z","timestamp":1742913324586,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_37","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"498-508","source":"Crossref","is-referenced-by-count":0,"title":["Towards Effective Algorithms for Intelligent Defense Systems"],"prefix":"10.1007","author":[{"given":"Michael N.","family":"Johnstone","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Woodward","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"29","key":"37_CR1","first-page":"12","volume":"4","author":"F.E. Ahmed","year":"2005","unstructured":"Ahmed, F.E.: Artificial neural networks for diagnosis and survival prediction in colon cancer. Molecular Cancer\u00a04(29), 12 (2005)","journal-title":"Molecular Cancer"},{"issue":"1","key":"37_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0933-3657(01)00094-X","volume":"24","author":"Z.-H. Zhou","year":"2002","unstructured":"Zhou, Z.-H., Jiang, Y., et al.: Lung cancer cell identification based on artificial neural network ensembles. Artificial Intelligence in Medicine\u00a024(1), 25\u201336 (2002)","journal-title":"Artificial Intelligence in Medicine"},{"issue":"16","key":"37_CR3","doi-asserted-by":"publisher","first-page":"413","DOI":"10.2528\/PIER10122203","volume":"113","author":"M. O\u2019Halloran","year":"2011","unstructured":"O\u2019Halloran, M., Mcginley, B., Concei\u00e7\u00e3o, R.C., Morgan, F., Jones, E., Glavin, M.: Spiking neural networks for breast cancer classification in a dielectrically heterogeneous breast. Progress In Electromagnetics Research\u00a0113(16), 413\u2013428 (2011)","journal-title":"Progress In Electromagnetics Research"},{"key":"37_CR4","first-page":"1031","volume-title":"Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation Conference","author":"A.M. Ahmad","year":"2012","unstructured":"Ahmad, A.M., Khan, G.M., et al.: Breast cancer detection using cartesian genetic programming evolved artificial neural networks. In: Proceedings of the Fourteenth International Conference on Genetic and Evolutionary Computation Conference, pp. 1031\u20131038. ACM, Philadelphia (2012)"},{"key":"37_CR5","unstructured":"Muthukkumarasamy, V., Blumenstein, M.M., et al.: Intelligent Illicit Object Detection System for Enhanced Aviation Security. Korea Advanced Institute of Science and Technology (2004)"},{"issue":"6","key":"37_CR6","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1109\/TSMCB.2004.835077","volume":"34","author":"M. Singh","year":"2004","unstructured":"Singh, M., Singh, S., et al.: A knowledge-based framework for image enhancement in aviation security. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics\u00a034(6), 2354\u20132365 (2004)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics"},{"issue":"7","key":"37_CR7","doi-asserted-by":"publisher","first-page":"10206","DOI":"10.1016\/j.eswa.2009.02.037","volume":"36","author":"T.S. Guzella","year":"2009","unstructured":"Guzella, T.S., Caminhas, W.M.: A review of machine learning approaches to Spam filtering. Expert Systems with Applications\u00a036(7), 10206\u201310222 (2009)","journal-title":"Expert Systems with Applications"},{"key":"37_CR8","unstructured":"Huadong, W., Siegel, M., Khosla, P.: Vehicle sound signature recognition by frequency vector principal component analysis. In: Proceedings of the IEEE Instrumentation and Measurement Technology Conference, IMTC 1998 (1998)"},{"key":"37_CR9","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s11042-010-0546-7","volume":"54","author":"P. Krishnamoorthy","year":"2011","unstructured":"Krishnamoorthy, P., Kumar, S.: Hierarchical audio content classification system using an optimal feature selection algorithm. Multimed. Tools Appl.\u00a054, 415\u2013444 (2011)","journal-title":"Multimed. Tools Appl."},{"key":"37_CR10","volume-title":"An Introduction to Genetic Algorithms","author":"S.N. Sivanandam","year":"2008","unstructured":"Sivanandam, S.N., Deepa, S.N.: An Introduction to Genetic Algorithms. Springer, Berlin (2008)"},{"key":"37_CR11","volume-title":"An Introduction to Multiagent Systems","author":"M.J. Wooldridge","year":"2002","unstructured":"Wooldridge, M.J.: An Introduction to Multiagent Systems. John Wiley & Sons, Chichester (2002)"},{"key":"37_CR12","doi-asserted-by":"publisher","DOI":"10.1142\/6429","volume-title":"Principles of Artificial Neural Networks","author":"D. Graupe","year":"2007","unstructured":"Graupe, D.: Principles of Artificial Neural Networks, 2nd edn. World Scientific, Singapore (2007)","edition":"2"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Bayes, M., Price, M.: An Essay towards Solving a Problem in the Doctrine of Chances. By the Late Rev. Mr. Bayes, F. R. S. Communicated by Mr. Price, in a Letter to John Canton, A. M. F. R. S. Philosophical Transactions\u00a053, 370\u2013418 (1763)","DOI":"10.1098\/rstl.1763.0053"},{"key":"37_CR14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5236.001.0001","volume-title":"Parallel distributed processing: Exploration in the microstructure of cognition","author":"D.E. Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., McClelland, J.L.: Parallel distributed processing: Exploration in the microstructure of cognition. MIT Press, Cambridge (1986)"},{"issue":"5","key":"37_CR15","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1109\/TSMCB.2005.847740","volume":"35","author":"E. Cant\u00fa-Paz","year":"2005","unstructured":"Cant\u00fa-Paz, E., Kamath, C.: An empirical comparison of combinations of evolutionary algorithms and neural networks for classification problems. IEEE Trans. Syst. Man Cybern. B Cybern.\u00a035(5), 915\u2013927 (2005)","journal-title":"IEEE Trans. Syst. Man Cybern. B Cybern."},{"key":"37_CR16","first-page":"1","volume":"14","author":"R. Sukanesh","year":"2007","unstructured":"Sukanesh, R., Harikumar, R.: A Comparison of Genetic Algorithm & Neural Network (MLP) In Patient Specific Classification of Epilepsy Risk Levels from EEG Signals. Engineering Letters\u00a014, 1 (2007)","journal-title":"Engineering Letters"},{"key":"37_CR17","first-page":"141","volume-title":"Proceedings of the Fourth Australasian Data Mining Workshop (AusDM 2005)","author":"F. Zheng","year":"2005","unstructured":"Zheng, F., Webb, G.I.: A Comparative Study of Semi-naive Bayes Methods in Classification Learning. In: Simoff, S.J., Williams, G.J., Galloway, J., Kolyshkina, I. (eds.) Proceedings of the Fourth Australasian Data Mining Workshop (AusDM 2005), pp. 141\u2013156. University of Technology, Sydney (2005)"},{"key":"37_CR18","unstructured":"Fleizach, C., Fukushima, S.: A naive Bayes classifier on 1998 KDD Cup (2006)"},{"key":"37_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/3-540-45757-7_11","volume-title":"Logics in Artificial Intelligence","author":"M. Dekhtyar","year":"2002","unstructured":"Dekhtyar, M., Dikovsky, A., Valiev, M.: Complexity of Multi-agent Systems Behavior. In: Flesca, S., Greco, S., Leone, N., Ianni, G. (eds.) JELIA 2002. LNCS (LNAI), vol.\u00a02424, pp. 125\u2013136. Springer, Heidelberg (2002)"},{"key":"37_CR20","unstructured":"Elkind, E., Markakis, E.: Computational Complexity in Multi-Agent Systems. In: 10th European Agent Systems Summer School, EASSS 2008 (2008)"},{"key":"37_CR21","unstructured":"Owechko, Y., Shams, S.: Comparison of neural network and genetic algorithms for a resource allocation problem. In: Proc. Neural Networks, IEEE World Congress on Computational Intelligence (1994)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T06:25:37Z","timestamp":1594967137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}