{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:02:51Z","timestamp":1742918571995,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_44","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"563-577","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Josy Elsa","family":"Varghese","sequence":"first","affiliation":[]},{"given":"Balachandra","family":"Muniyal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"issue":"19","key":"44_CR1","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1016\/j.fss.2007.04.023","volume":"158","author":"M Sarkar","year":"2007","unstructured":"Sarkar, M.: Fuzzy-rough nearest neighbor algorithms in classification. Fuzzy Sets Syst. 158(19), 2134\u20132152 (2007)","journal-title":"Fuzzy Sets Syst."},{"key":"44_CR2","unstructured":"The NSL KDD dataset (2016). \n                  http:\/\/nsl.cs.unb.ca\/NSL-KDD\/\n                  \n                . Last Accessed 21 July 2017"},{"key":"44_CR3","unstructured":"Weka- data mining machine learning software (2016). \n                  http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/\n                  \n                . Last Accessed 24 Mar 2017"},{"key":"44_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-04062-7_17","volume-title":"Global Security, Safety, and Sustainability","author":"E Beqiri","year":"2009","unstructured":"Beqiri, E.: Neural networks for intrusion detection systems. In: Jahankhani, H., Hessami, A.G., Hsu, F. (eds.) ICGS3 2009. CCIS, vol. 45, pp. 156\u2013165. Springer, Heidelberg (2009). \n                  https:\/\/doi.org\/10.1007\/978-3-642-04062-7_17"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2014","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16, 303\u2013336 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"44_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s005000050002","volume":"1","author":"PP Bonissone","year":"1997","unstructured":"Bonissone, P.P.: Soft computing: the convergence of emerging reasoning technologies. Soft Comput. 1(1), 6\u201318 (1997)","journal-title":"Soft Comput."},{"key":"44_CR7","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TSMCC.2002.801356","volume":"32","author":"SB Cho","year":"2002","unstructured":"Cho, S.B.: Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Trans. Syst. Man Cybern. Part C 32, 154\u2013160 (2002)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"key":"44_CR8","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","volume":"78","author":"M Conti","year":"2018","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities. Futur. Gener. Comput. Syst. 78, 544\u2013546 (2018). \n                  https:\/\/doi.org\/10.1016\/j.future.2017.07.060\n                  \n                . \n                  http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X17316667","journal-title":"Futur. Gener. Comput. Syst."},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Dias, L.P., Cerqueira, J.J.F., Assis, K.D.R., Almeida, R.C.: Using artificial neural network in intrusion detection systems to computer networks. In: 2017 9th Computer Science and Electronic Engineering (CEEC), pp. 145\u2013150 (2017)","DOI":"10.1109\/CEEC.2017.8101615"},{"key":"44_CR10","unstructured":"Gasparovica-Asite, M., Aleksejeva, L.: Using fuzzy unordered rule induction algorithm for cancer data classification. In: Mendel 2011: 17th International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Fuzzy Logic, Rough Sets, Neural Networks, Fractals, Bayesian Methods, pp. 15\u201317, June 2011"},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Hodo, E., et al.: Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1\u20136 (2016)","DOI":"10.1109\/ISNCC.2016.7746067"},{"issue":"3","key":"44_CR12","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10618-009-0131-8","volume":"19","author":"J H\u00fchn","year":"2009","unstructured":"H\u00fchn, J., H\u00fcllermeier, E.: FURIA: an algorithm for unordered fuzzy rule induction. Data Min. Knowl. Discov. 19(3), 293\u2013319 (2009)","journal-title":"Data Min. Knowl. Discov."},{"key":"44_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.procs.2016.09.366","volume":"102","author":"D Ibrahim","year":"2016","unstructured":"Ibrahim, D.: An overview of soft computing. Procedia Comput. Sci. 102, 34\u201338 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Ishitaki, T.: Application of neural networks for intrusion detection in Tor networks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, Gwangju, South Korea (2015)","DOI":"10.1109\/WAINA.2015.136"},{"issue":"1","key":"44_CR15","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TSMCC.2010.2050685","volume":"41","author":"S Mabu","year":"2011","unstructured":"Mabu, S., Chen, C., Lu, N., Shimada, K., Hirasawa, K.: An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 41(1), 130\u2013139 (2011)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"44_CR16","unstructured":"Mishra, N., Mishra, S.: Intrusion detection using IoT (2018)"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Owais, S.S.J., Sn\u00e1sel, V., Kr\u00f6mer, P., Abraham, A.: Survey: using genetic algorithm approach in intrusion detection systems techniques. In: 2008 7th Computer Information Systems and Industrial Management Applications, pp. 300\u2013307 (2008)","DOI":"10.1109\/CISIM.2008.49"},{"issue":"2","key":"44_CR18","first-page":"7","volume":"4","author":"A Panigrah","year":"2016","unstructured":"Panigrah, A., Patra, M.: Fuzzy rough classification models for network intrusion detection. Trans. Mach. Learn. Artif. Intell. 4(2), 7 (2016)","journal-title":"Trans. Mach. Learn. Artif. Intell."},{"key":"44_CR19","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-22577-2_2","volume-title":"High Performance Architecture and Grid Computing","author":"KK Rao","year":"2011","unstructured":"Rao, K.K., SVP Raju, G.: An overview on soft computing techniques. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds.) HPAGC 2011. CCIS, vol. 169, pp. 9\u201323. Springer, Heidelberg (2011). \n                  https:\/\/doi.org\/10.1007\/978-3-642-22577-2_2"},{"key":"44_CR20","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/978-3-642-30111-7_70","volume-title":"Advances in Computer Science, Engineering & Applications","author":"MV Rao","year":"2012","unstructured":"Rao, M.V., Damodaram, A., Charyulu, N.C.B.: Algorithm for clustering with intrusion detection using modified and hashed k - means algorithms. In: Wyld, D.C., Zizka, J., Nagamalai, D. (eds.) Advances in Computer Science, Engineering & Applications, vol. 167, pp. 737\u2013744. Springer, Heidelberg (2012). \n                  https:\/\/doi.org\/10.1007\/978-3-642-30111-7_70"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Subba, B., Biswas, S., Karmakar, S.: A neural network based system for intrusion detection and attack classification. In: 2016 Twenty Second National Conference on Communication (NCC), pp. 1\u20136 (2016)","DOI":"10.1109\/NCC.2016.7561088"},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"44_CR23","doi-asserted-by":"crossref","unstructured":"Varghese, J.E., Muniyal, B.: An investigation of classification algorithms for intrusion detection system - a quantitative approach. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2045\u20132051 (2017)","DOI":"10.1109\/ICACCI.2017.8126146"},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Weng, F., Jiang, Q., Shi, L., Wu, N.: An intrusion detection system based on the clustering ensemble. In: 2007 International Workshop on Anti-counterfeiting, Security and Identification (ASID), pp. 121\u2013124 (2007)","DOI":"10.1109\/IWASID.2007.373710"},{"key":"44_CR25","unstructured":"Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning. CoRR abs\/1801.06275 (2018)"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:54:05Z","timestamp":1558396445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}