{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:07:20Z","timestamp":1743127640509,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811322020"},{"type":"electronic","value":"9789811322037"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-2203-7_14","type":"book-chapter","created":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T10:33:22Z","timestamp":1536402802000},"page":"182-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Research on Network Intrusion Data Based on KNN and Feature Extraction Algorithm"],"prefix":"10.1007","author":[{"given":"Shuai","family":"Dong","sequence":"first","affiliation":[]},{"given":"Xingang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,9]]},"reference":[{"unstructured":"Bloede, K., Mischou, G., Senan, A., Koontz, R.: The Internet of Things. Woodside Capital Partners (2015). http:\/\/www.woodsidecap.com\/wp-content\/uploads\/2015\/03\/WCP-IOT-M_and_A-REPORT-2015-3.pdf. Accessed 27 Oct 2016. Elissa, K.: Title of paper if known, unpublished","key":"14_CR1"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.diin.2017.02.001","volume":"20","author":"DM Divakaran","year":"2017","unstructured":"Divakaran, D.M., et al.: Evidence gathering for network security and forensics. Digit. Invest. 20, 56\u201365 (2017)","journal-title":"Digit. Invest."},{"key":"14_CR3","volume-title":"A Treatise on Electricity and Magnetism","author":"JC Maxwell","year":"1892","unstructured":"Maxwell, J.C.: A Treatise on Electricity and Magnetism, vol. 2, 3rd edn. Clarendon, Oxford (1892)","edition":"3"},{"unstructured":"Nicole, R.: Title of paper with only first word capitalized. J. Name Stand. Abbrev., 68\u201373, in press","key":"14_CR4"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.knosys.2014.08.013","volume":"71","author":"EDL Hoz","year":"2014","unstructured":"Hoz, E.D.L., Hoz, E.D.L., Ortiz, A., et al.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps. Knowl. Based Syst. 71, 322\u2013338 (2014)","journal-title":"Knowl. Based Syst."},{"issue":"9","key":"14_CR6","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., et al.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136323 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.cose.2014.06.006","volume":"45","author":"R Chitraker","year":"2014","unstructured":"Chitraker, R., Huang, C.: Selection of candidate support vectors in incremental SVM for network intrusion detection. Comput. Secur. 45(3), 231\u2013241 (2014)","journal-title":"Comput. Secur."},{"issue":"5786","key":"14_CR8","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Salakhudinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (2006)","journal-title":"Science"},{"unstructured":"PCA indexing based feature learning and feature selection","key":"14_CR9"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TGRS.2013.2241444","volume":"52","author":"AM Cheryadat","year":"2014","unstructured":"Cheryadat, A.M.: Unsupervised feature learning for aerial scene classification. IEEE Trans. Geosci. Remote Sens. 52(1), 439\u2013451 (2014)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"6","key":"14_CR11","first-page":"1790","volume":"2","author":"S Lakhina","year":"2010","unstructured":"Lakhina, S., Joseph, S., Verma, B.: Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD. Int. J. Eng. Sci. Technol. 2(6), 1790\u20131799 (2010)","journal-title":"Int. J. Eng. Sci. Technol."},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.asoc.2014.01.028","volume":"18","author":"F Kuang","year":"2014","unstructured":"Kuang, F., Xu, W., Zhang, S.: A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl. Soft Comput. 18(4), 178\u2013184 (2014)","journal-title":"Appl. Soft Comput."},{"issue":"8","key":"14_CR13","first-page":"3237","volume":"8","author":"F Kuang","year":"2012","unstructured":"Kuang, F., Xu, W., Wnag, Y.: A novel approach of KPCA and SVM for intrusion detection. J. Comput. Inf. Syst. 8(8), 3237\u20133244 (2012)","journal-title":"J. Comput. Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Aung, Y., Min, M.: An analysis of random forest algorithm based network intrusion detection system. In: 2017 18th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), Kanazawa, Japan, pp. 127\u2013132 (2017)","key":"14_CR14","DOI":"10.1109\/SNPD.2017.8022711"},{"doi-asserted-by":"crossref","unstructured":"Chang, Y., Li, W., Yang, Z.: Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, pp. 635\u2013638 (2017)","key":"14_CR15","DOI":"10.1109\/CSE-EUC.2017.118"},{"unstructured":"Stolfo, S.J., Fan, W., Lee, W.K., et al.: Cost-based modeling for fraud and intrusion detection: results from the jam project [EB\/OL]. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html","key":"14_CR16"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-2203-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:52:35Z","timestamp":1710330755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-13-2203-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811322020","9789811322037"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-2203-7_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"9 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhengzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ICPCSEE 2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}