{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:54:59Z","timestamp":1775084099054,"version":"3.50.1"},"publisher-location":"New Delhi","reference-count":11,"publisher":"Springer India","isbn-type":[{"value":"9788132226932","type":"print"},{"value":"9788132226956","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_45","type":"book-chapter","created":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T20:41:10Z","timestamp":1445719270000},"page":"539-547","source":"Crossref","is-referenced-by-count":56,"title":["Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection"],"prefix":"10.1007","author":[{"given":"Navaneeth Kumar","family":"Kanakarajan","sequence":"first","affiliation":[]},{"given":"Kandasamy","family":"Muniasamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"issue":"1","key":"45_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"45_CR2","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.inffus.2014.01.009","volume":"20","author":"JF D\u00edez-Pastor","year":"2014","unstructured":"D\u00edez-Pastor, J.F., Garc\u00eda-Osorio, C., Rodr\u00edguez, J.J.: Tree ensemble construction using a GRASP-based heuristic and annealed randomness. Inf. Fusion 20, 189\u2013202 (2014)","journal-title":"Inf. Fusion"},{"issue":"1","key":"45_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"45_CR4","unstructured":"Hall, M.A., Smith, L.A.: Feature subset selection: a correlation based filter approach (1997)"},{"key":"45_CR5","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers Inc., San Francisco (2011)"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Hota, H., Shrivas, A.K.: Data mining approach for developing various models based on types of attack and feature selection as intrusion detection systems (IDS). In: Intelligent Computing, Networking, and Informatics, pp. 845\u2013851. Springer (2014)","DOI":"10.1007\/978-81-322-1665-0_85"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Hota, H., Shrivas, A.K.: Decision tree techniques applied on NSL-KDD data and its comparison with various feature selection techniques. In: Advanced Computing, Networking and Informatics-Volume 1, pp. 205\u2013211. Springer (2014)","DOI":"10.1007\/978-3-319-07353-8_24"},{"key":"45_CR8","first-page":"3","volume-title":"Numerical Recipes in C","author":"WH Press","year":"1988","unstructured":"Press, W.H., Teukolsky, S., Vetterling, W., Flannery, B.: Numerical Recipes in C, vol. 1, p. 3. Cambridge University Press, Cambridge (1988)"},{"key":"45_CR9","unstructured":"Pujari, A.K.: Data Mining Techniques. Universities Press (2001)"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Tesfahun, A., Bhaskari, D.L.: Intrusion detection using random forests classifier with SMOTE and feature reduction. In: 2013 International Conference on Cloud and Ubiquitous Computing and Emerging Technologies (CUBE), pp. 127\u2013132. IEEE (2013)","DOI":"10.1109\/CUBE.2013.31"},{"key":"45_CR11","unstructured":"The NSL-KDD Data Set. \n                    http:\/\/nsl.cs.unb.ca\/NSL-KDD\/"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:06:48Z","timestamp":1559279208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}