{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:09Z","timestamp":1725790989033},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_38","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T02:15:38Z","timestamp":1395713738000},"page":"386-395","source":"Crossref","is-referenced-by-count":0,"title":["A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Zhi-Guo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Sung-Ryul","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","unstructured":"Lu, H., Xu, J.: Three-level Hybrid Intrusion Detection System"},{"key":"38_CR2","unstructured":"http:\/\/www.sans.org\/reading-room\/whitepapers\/detection\/understanding-intrusion-detection-systems-337"},{"key":"38_CR3","unstructured":"Brown, D.J., Suckow, B., Wang, T.: A Survey of Intrusion Detection Systems"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Hlaing, T.: Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection. International Journal of Informatics and Communication Technology (IJ-ICT)\u00a01(2), 2252\u20138776 (2012) ISSN: 2252-8776","DOI":"10.11591\/ij-ict.v1i2.591"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Ben Amor, N., Benferhat, S., Elouedi, Z.: Naive bayes vs decision trees in intrusion detection systems. In: ACM Symposium on Applied Computing (SAC 2004), pp. 420\u2013424, Nic-osia, Cyprus (2004)","DOI":"10.1145\/967900.967989"},{"key":"38_CR6","unstructured":"Smith, L.I.: A tutorial on Principal Components Analysis, New York (2002)"},{"key":"38_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1007\/978-3-642-36818-9_55","volume-title":"Information and Communication Technology","author":"L. Zhao","year":"2013","unstructured":"Zhao, L., Kang, H.-S., Kim, S.-R.: Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 490\u2013495. Springer, Heidelberg (2013)"},{"key":"38_CR8","first-page":"81","volume":"1","author":"J.R. Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of Decision Trees. Machine Learning\u00a01, 81\u2013106 (1986)","journal-title":"Machine Learning"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Quinlan, J.R.: Improved Use of Continuous Attributes in C4.5. Journal of Artifcial Intelligence Research\u00a04, 77\u201390 (1996); Submitted 10\/95; published 3\/96","DOI":"10.1613\/jair.279"},{"key":"38_CR10","unstructured":"Jain, Y.K.: Upendra: An Efficient Intrusion Detection Based on Decision Tree Classifier Using Feature Reduction. International Journal of Scientific and Research Publications\u00a02(1) (January 2012) ISSN 2250-3153"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Ruggieri, S.: Efficient C4.5. IEEE Transactions on Knowledge and Data Engineering\u00a014(2) (March\/April 2002)","DOI":"10.1109\/69.991727"},{"key":"38_CR12","unstructured":"The third international knowledge discovery and data mining tools competition dataset KDD 1999-Cup (1999), \n                      \n                        http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T08:40:09Z","timestamp":1558860009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}