{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:36Z","timestamp":1740099276420,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811337314"},{"type":"electronic","value":"9789811337321"}],"license":[{"start":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T00:00:00Z","timestamp":1546128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-3732-1_1","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T17:44:04Z","timestamp":1546105444000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3104-0622","authenticated-orcid":false,"given":"Alexander","family":"Branitskiy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6859-7120","authenticated-orcid":false,"given":"Igor","family":"Kotenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Branitskiy, A., Kotenko, I.: Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. In: IEEE 18th International Conference on Computational Science and Engineering (CSE), pp. 152\u2013159 (2015)","DOI":"10.1109\/CSE.2015.26"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jocs.2016.07.010","volume":"23","author":"A Branitskiy","year":"2017","unstructured":"Branitskiy, A., Kotenko, I.: Hybridization of computational intelligence methods for attack detection in computer networks. J. Comput. Sci. 23, 145\u2013156 (2017)","journal-title":"J. Comput. Sci."},{"key":"1_CR3","first-page":"511","volume-title":"Lecture Notes in Computer Science","author":"Hansung Lee","year":"2005","unstructured":"Lee, H., Song, J., Park, D.: Intrusion detection system based on multi-class SVM. In: Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, pp. 511\u2013519 (2005)"},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J. Int. J. Very Large Data Bases 16(4), 507\u2013521 (2007)","journal-title":"VLDB J. Int. J. Very Large Data Bases"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/11527503_82","volume-title":"Advanced Data Mining and Applications","author":"Xin Xu","year":"2005","unstructured":"Xu, X., Wang, X.: An adaptive network intrusion detection method based on PCA and support vector machines. In: International Conference on Advanced Data Mining and Applications, pp. 696\u2013703 (2005)"},{"key":"1_CR6","unstructured":"Kim, D. S., Nguyen, H.-N., Park, J. S.: Genetic algorithm to improve SVM based network intrusion detection system. In: 19th International Conference on Advanced Information Networking and Applications, vol. 2, pp. 155\u2013158 (2005)"},{"key":"1_CR7","unstructured":"Shon, T., Kim, Y., Lee, C., Moon, J.: A machine learning framework for network anomaly detection using SVM and GA. In: Information Assurance Workshop, IAW 2005, Proceedings from the Sixth Annual IEEE SMC, pp. 176\u2013183 (2005)"},{"key":"1_CR8","unstructured":"Wang, J., Hong, X., Ren, R., Li, T.: A real-time intrusion detection system based on PSO-SVM. In: Proceedings of the International Workshop on Information Security and Application, pp. 319\u2013321 (2009)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Li, L., Zhao, K.: A new intrusion detection system based on rough set theory and fuzzy support vector machine. In: 3rd International Workshop on Intelligent Systems and Applications (ISA), pp. 1\u20135 (2011)","DOI":"10.1109\/ISA.2011.5873410"},{"issue":"4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.jksus.2017.05.013","volume":"29","author":"IS Thaseen","year":"2017","unstructured":"Thaseen, I.S., Kumar, C.A.: Intrusion detection model using fusion of chi-square feature selection and multi class SVM. J. King Saud Univ. Comput. Inf. Sci. 29(4), 462\u2013472 (2017)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Abraham, A., Thomas, J.: Distributed intrusion detection systems: a computational intelligence approach. In: Applications of Information Systems to Homeland Security and Defense, pp. 107\u2013137 (2006)","DOI":"10.4018\/978-1-59140-640-2.ch005"},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S Peddabachigari","year":"2007","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 30(1), 114\u2013132 (2007)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"1_CR13","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C-W Hsu","year":"2002","unstructured":"Hsu, C.-W., Lin, C.-J.: A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 13(2), 415\u2013425 (2002)","journal-title":"IEEE Trans. Neural Netw."},{"key":"1_CR14","unstructured":"Drucker, H., Burges, C.J.C., Kaufman, L., Smola, A.J., Vapnik, V.: Support vector regression machines. In: Advances in Neural Information Processing Systems, pp. 155\u2013161 (1997)"},{"key":"1_CR15","first-page":"999","volume-title":"Lecture Notes in Computer Science","author":"K. -R. M\u00fcller","year":"1997","unstructured":"M\u00fcller, K.-R., Smola, A.J., R\u00e4tsch, G., Sch\u00f6lkopf, B., Kohlmorgen, J., Vapnik, V.: Predicting time series with support vector machines. In: International Conference on Artificial Neural Networks, pp. 999\u20131004 (1997)"},{"key":"1_CR16","unstructured":"Platt, J.: Sequential minimal optimization: a fast algorithm for training support vector machines (1998)"},{"key":"1_CR17","unstructured":"Stevens, W. R.: TCP\/IP illustrated, volume 1: The protocols. Addison-Wesley Professional (1993)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Refaeilzadeh, P., Tang, L., Liu, H.: Cross-validation. Encyclopedia of Database Systems, pp. 532\u2013538 (2009)","DOI":"10.1007\/978-0-387-39940-9_565"},{"key":"1_CR19","first-page":"101","volume":"5","author":"R Rifkin","year":"2004","unstructured":"Rifkin, R., Klautau, A.: In defense of one-vs-all classification. J. Mach. Learn. Res. 5, 101\u2013141 (2004)","journal-title":"J. Mach. Learn. Res."},{"issue":"8","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1016\/j.patcog.2011.01.017","volume":"44","author":"M Galar","year":"2011","unstructured":"Galar, M., Fern\u00e1ndez, A., Barrenechea, E., Bustince, H., Herrera, F.: An overview of ensemble methods for binary classifiers in multi-class problems: experimental study on one-vs-one and one-vs-all schemes. Pattern Recogn. 44(8), 1761\u20131776 (2011)","journal-title":"Pattern Recogn."},{"issue":"6","key":"1_CR21","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1109\/TPAMI.2006.123","volume":"28","author":"N Garc\u00eda-Pedrajas","year":"2006","unstructured":"Garc\u00eda-Pedrajas, N., Ortiz-Boyer, D.: Improving multiclass pattern recognition by the combination of two strategies. IEEE Trans. Pattern Anal. Mach. Intell. 28(6), 1001\u20131006 (2006)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"1_CR22","first-page":"60","volume":"8","author":"I Kotenko","year":"2017","unstructured":"Kotenko, I., Saenko, I., Kushnerevich, A.: Parallel big data processing system for security monitoring in Internet of Things networks. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 8(4), 60\u201374 (2017)","journal-title":"J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"issue":"2","key":"1_CR23","first-page":"60","volume":"7","author":"V Desnitsky","year":"2016","unstructured":"Desnitsky, V., Levshun, D., Chechulin, A., Kotenko, I.: Design technique for secure embedded devices: application for creation of integrated cyber-physical security system. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 7(2), 60\u201380 (2016)","journal-title":"J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA)"},{"issue":"1","key":"1_CR24","first-page":"28","volume":"7","author":"J Zeng","year":"2017","unstructured":"Zeng, J., Ke, F., Zuo, Y., Liu, Q., Huang, M., Cao, Y.: Multi-attribute aware path selection approach for efficient MPTCP-based data delivery. J. Internet Serv. Inf. Secur. 7(1), 28\u201339 (2017)","journal-title":"J. Internet Serv. Inf. Secur."},{"issue":"1","key":"1_CR25","first-page":"2","volume":"6","author":"T Kurokawa","year":"2016","unstructured":"Kurokawa, T., Nojima, R., Moriai, S.: On the security of CBC mode in SSL3.0 and TLS1.0. J. Internet Serv. Inf. Secur. 6(1), 2\u201319 (2016)","journal-title":"J. Internet Serv. Inf. Secur."}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-3732-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,21]],"date-time":"2020-11-21T01:18:27Z","timestamp":1605921507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-3732-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,30]]},"ISBN":["9789811337314","9789811337321"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-3732-1_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018,12,30]]},"assertion":[{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isyou.info\/conf\/mobisec17\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}