{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:33:13Z","timestamp":1725895993522},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353796"},{"type":"electronic","value":"9783642353802"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35380-2_60","type":"book-chapter","created":{"date-parts":[[2012,12,14]],"date-time":"2012-12-14T19:00:04Z","timestamp":1355511604000},"page":"509-518","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Network Traffic Data Classification for Intrusion Detection Using Genetic Algorithm"],"prefix":"10.1007","author":[{"given":"Rahul","family":"Mitra","sequence":"first","affiliation":[]},{"given":"Sahisnu","family":"Mazumder","sequence":"additional","affiliation":[]},{"given":"Tuhin","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Nandita","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Jaya","family":"Sil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","unstructured":"SANS Institute InfoSec Reading Room site: Understanding Intrusion Detection Systems"},{"key":"60_CR2","unstructured":"Scarfone, K., Mell, P.: Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology"},{"key":"60_CR3","volume-title":"Data Mining: Concepts And Techniques","author":"Han","year":"2001","unstructured":"Han, Kamber, M.: Data Mining: Concepts And Techniques. MorganKaufmann Publishers, San Francisco (2001)"},{"key":"60_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X. Wu","year":"2008","unstructured":"Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst.\u00a014, 1\u201337 (2008), doi:10.1007\/s10115-007-0114-2","journal-title":"Knowl. Inf. Syst."},{"key":"60_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/S0378-3758(96)00186-3","volume":"62","author":"B. Rosen","year":"1997","unstructured":"Rosen, B.: On sampling with probability proportional to size. Journal of Statistical Planning and Inference\u00a062, 159\u2013191 (1997)","journal-title":"Journal of Statistical Planning and Inference"},{"key":"60_CR6","unstructured":"KDD Cup (1999), \n                  \n                    http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"60_CR7","unstructured":"Komorowski, J., Polkowski, L., Skowron, A.: Rough Set: A tutorial"},{"key":"60_CR8","unstructured":"Wyatt, D.: Applying the XCS Learning Classifier System to Continuous-Valued Data-mining Problems, Technical Report UWELCSG05-001 (September 2004)"},{"key":"60_CR9","volume-title":"Genetic algorithms in search, optimization and machine earning","author":"D.E. Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic algorithms in search, optimization and machine earning. Addison-Wesley, Reading (1989)"},{"key":"60_CR10","unstructured":"Selvakuberan, K., Indradevi, M., Rajaram, R.: Combined Feature Selection and classification\u2013A novel approach for thecategorization of web pages"},{"key":"60_CR11","unstructured":"Data Mining Algorithm In R\/Dimensionality Reduction\/Feature Selection, \n                  \n                    http:\/\/www.wikipedia.org\/"},{"key":"60_CR12","unstructured":"Nsl-kdd data set for network-based intrusion detection systems (March 2009), \n                  \n                    http:\/\/nsl.cs.unb.ca\/NSL-KDD\/"},{"key":"60_CR13","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A Detailed Analysis of the KDD CUP 99 Data Set"},{"key":"60_CR14","unstructured":"Weka 3: Data Mining Software in Java, \n                  \n                    http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"60_CR15","unstructured":"Weka User Manual, \n                  \n                    http:\/\/www.gtbit.org\/downloads\/dwdmsem6\/dwdmsem6lman.pdf\n                  \n                  \n                , \n                  \n                    http:\/\/kent.dl.sourceforge.net\/project\/weka\/documentation\/3.6.x\/WekaManual-3-6-2.pdf"}],"container-title":["Lecture Notes in Computer Science","Swarm, Evolutionary, and Memetic Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35380-2_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T20:33:11Z","timestamp":1557433991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35380-2_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353796","9783642353802"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35380-2_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}