{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:54:07Z","timestamp":1770990847058,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662450482","type":"print"},{"value":"9783662450499","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45049-9_38","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T10:07:14Z","timestamp":1411121234000},"page":"230-238","source":"Crossref","is-referenced-by-count":8,"title":["A Hybrid Bat Based Feature Selection Approach for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Mohamed Amine","family":"Laamari","sequence":"first","affiliation":[]},{"given":"Nadjet","family":"Kamel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection using neural networks and support vector machines. In: Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN 2002, vol.\u00a02, pp. 1702\u20131707. IEEE (2002)","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection. In: Applications of Data Mining in Computer Security. Springer, pp. 77\u2013101 (2002)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"38_CR3","unstructured":"Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system (NIDES): A summary. SRI International, Computer Science Laboratory (1995)"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Caberera, J., Ravichandran, B., Mehra, R.K.: Statistical traffic modeling for network intrusion detection. In: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 466\u2013473. IEEE (2000)","DOI":"10.1109\/MASCOT.2000.876573"},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0893-6080(03)00169-2","volume":"17","author":"V. Cherkassky","year":"2004","unstructured":"Cherkassky, V., Ma, Y.: Practical selection of svm parameters and noise estimation for svm regression. Neural Networks\u00a017(1), 113\u2013126 (2004)","journal-title":"Neural Networks"},{"key":"38_CR6","unstructured":"The nsl-kdd data set. http:\/\/nsl.cs.unb.ca\/NSL-KDD\/ (June 2014)"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Vapnik, V.: The nature of statistical learning theory. Springer (2000)","DOI":"10.1007\/978-1-4757-3264-1"},{"issue":"3","key":"38_CR8","first-page":"273","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Machine Learning\u00a020(3), 273\u2013297 (1995)","journal-title":"Machine Learning"},{"key":"38_CR9","series-title":"SCI","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-12538-6_6","volume-title":"Nature Inspired Cooperative Strategies for Optimization (NICSO 2010)","author":"X.-S. Yang","year":"2010","unstructured":"Yang, X.-S.: A new metaheuristic bat-inspired algorithm. In: Gonz\u00e1lez, J.R., Pelta, D.A., Cruz, C., Terrazas, G., Krasnogor, N. (eds.) NICSO 2010. SCI, vol.\u00a0284, pp. 65\u201374. Springer, Heidelberg (2010)"},{"issue":"2","key":"38_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S1672-6529(11)60020-6","volume":"8","author":"Y. Liu","year":"2011","unstructured":"Liu, Y., Wang, G., Chen, H., Dong, H., Zhu, X., Wang, S.: An improved particle swarm optimization for feature selection. Journal of Bionic Engineering\u00a08(2), 191\u2013200 (2011)","journal-title":"Journal of Bionic Engineering"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Nakamura, R.Y., Pereira, L.A., Costa, K., Rodrigues, D., Papa, J.P., Yang, X.S.: Bba: A binary bat algorithm for feature selection. In: 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), pp. 291\u2013297. IEEE (2012)","DOI":"10.1109\/SIBGRAPI.2012.47"},{"issue":"1","key":"38_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1166\/jctn.2014.3329","volume":"11","author":"T. Song","year":"2014","unstructured":"Song, T., Wang, X., Su, Y.: A novel approach to identify protein coding domains by sampling binary profiles from genome. Journal of Computational and Theoretical Nanoscience\u00a011(1), 147\u2013152 (2014)","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"key":"38_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2012.09.002","volume":"9","author":"S. Mirjalili","year":"2013","unstructured":"Mirjalili, S., Lewis, A.: S-shaped versus v-shaped transfer functions for binary particle swarm optimization. Swarm and Evolutionary Computation\u00a09, 1\u201314 (2013)","journal-title":"Swarm and Evolutionary Computation"},{"issue":"4","key":"38_CR14","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.ijforecast.2006.03.001","volume":"22","author":"R.J. Hyndman","year":"2006","unstructured":"Hyndman, R.J., Koehler, A.B.: Another look at measures of forecast accuracy. International Journal of Forecasting\u00a022(4), 679\u2013688 (2006)","journal-title":"International Journal of Forecasting"},{"issue":"4","key":"38_CR15","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security\u00a03(4), 262\u2013294 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3","key":"38_CR16","first-page":"27","volume":"2","author":"C.C. Chang","year":"2011","unstructured":"Chang, C.C., Lin, C.J.: Libsvm: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST)\u00a02(3), 27 (2011)","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"38_CR17","unstructured":"Fister Jr., I., Fister, D., Yang, X.S.: A hybrid bat algorithm. ArXiv preprint ArXiv:1303.6310 (2013)"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing - Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45049-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T18:32:11Z","timestamp":1746383531000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45049-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662450482","9783662450499"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45049-9_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}