{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:59:21Z","timestamp":1771847961221,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811566332","type":"print"},{"value":"9789811566349","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-6634-9_25","type":"book-chapter","created":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:27:09Z","timestamp":1594996029000},"page":"272-282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of Feature Selection Methods for P2P Botnet Detection"],"prefix":"10.1007","author":[{"given":"Chirag","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Vishal","family":"Bharti","sequence":"additional","affiliation":[]},{"given":"Ranjeet Kumar","family":"Ranjan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-540-87481-2_21","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"Y Saeys","year":"2008","unstructured":"Saeys, Y., Abeel, T., Van de Peer, Y.: Robust feature selection using ensemble feature selection techniques. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008. LNCS (LNAI), vol. 5212, pp. 313\u2013325. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-87481-2_21"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIT.1968.1054102","volume":"14","author":"G Hughes","year":"1968","unstructured":"Hughes, G.: On the mean accuracy of statistical pattern recognizer. IEEE Trans. Inf. Theory 14(1), 55\u201363 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"25_CR3","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3, 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"25_CR4","doi-asserted-by":"publisher","unstructured":"Chandrashekar, G., Sahin, F.: A survey on feature selection methods. Comput. Electr. Eng. 40(1), 16\u201328 (2014). \nhttps:\/\/doi.org\/10.1016\/j.compeleceng.2013.11.024","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1109\/TCBB.2012.33","volume":"9","author":"C Lazar","year":"2012","unstructured":"Lazar, C., Taminau, J., Meganck, S., Steenhoff, D., Coletta, A., Molter, C., et al.: A survey on filter techniques for feature selection in gene expression microarray analysis. IEEE\/ACM Trans. Comput. Biol. Bioinform. 9, 1106\u20131119 (2012)","journal-title":"IEEE\/ACM Trans. Comput. Biol. Bioinform."},{"key":"25_CR6","unstructured":"Yang, M., Wen, Q.: A multi-level feature extraction technique to detect moble botnet. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), 14 October 2016, pp. 2495\u20132498. IEEE (2016)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Alejandre, F.V., Cort\u00e9s, N.C., Anaya, E.A.: Feature selection to detect botnets using machine learning algorithms. In: 2017 International Conference on Electronics, Communications and Computers (CONIELECOMP), 22 February 2017, pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/CONIELECOMP.2017.7891834"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-30955-7_5","volume-title":"Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems","author":"G Kirubavathi Venkatesh","year":"2012","unstructured":"Kirubavathi Venkatesh, G., Anitha Nadarajan, R.: HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network. In: Askoxylakis, I., P\u00f6hls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 38\u201348. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-30955-7_5"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Garant, D., Lu, W.: Mining botnet behaviors on the large-scale web application community. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops, March 2013, pp. 185\u2013190 (2013)","DOI":"10.1109\/WAINA.2013.235"},{"issue":"14","key":"25_CR10","doi-asserted-by":"publisher","first-page":"6371","DOI":"10.1016\/j.eswa.2014.04.019","volume":"41","author":"N Hoque","year":"2014","unstructured":"Hoque, N., Bhattacharyya, D., Kalita, J.: MIFS-ND: a mutual information-based feature selection method. Expert Syst. Appl. 41(14), 6371\u20136385 (2014)","journal-title":"Expert Syst. Appl."},{"key":"25_CR11","series-title":"Springer Series in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. SSS. Springer, New York (2009). \nhttps:\/\/doi.org\/10.1007\/978-0-387-84858-7"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. Technical report, School of Computer Science, Carneige Melon University (2006)","DOI":"10.21236\/ADA456046"},{"key":"25_CR13","series-title":"Lecture Notes in Statistics","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4612-2404-4_19","volume-title":"learning from data","author":"DW Aha","year":"1996","unstructured":"Aha, D.W., Bankert, R.L.: A comparative evaluation of sequential feature selection algorithms, learning from data. In: Fisher, D., Lenz, H.J. (eds.) learning from data. Lecture Notes in Statistics, vol. 112, pp. 199\u2013206. Springer, New York (1996). \nhttps:\/\/doi.org\/10.1007\/978-1-4612-2404-4_19"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TSMC.1973.5408575","volume":"SMC-3","author":"LA Zadeh","year":"1973","unstructured":"Zadeh, L.A.: Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans. Syst. Man Cybern. SMC-3, 28\u201344 (1973)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"25_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5689-3","volume-title":"Feature Selection for Knowledge Discovery and Data Mining","author":"H Liu","year":"1998","unstructured":"Liu, H., Motoda, H.: Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic, Boston (1998)"},{"key":"25_CR16","unstructured":"Dunne, K., Cunningham, P., Azuaje, F.: Solutions to instability problems with sequential wrapper-based approaches to feature selection. Technical report TCD-2002-28. Department of Computer Science, Trinity College, Dublin, Ireland (2002)"},{"issue":"1","key":"25_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10115-006-0040-8","volume":"12","author":"A Kalousis","year":"2007","unstructured":"Kalousis, A., Prados, J., Hilario, M.: Stability of feature selection algorithms: a study on high-dimensional spaces. Knowl. Inf. Syst. 12(1), 95\u2013116 (2007). \nhttps:\/\/doi.org\/10.1007\/s10115-006-0040-8","journal-title":"Knowl. Inf. Syst."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Fagiolini, A., Valenti, G., Pallottino, L., Dini, G., Bicchi, A.: Decentralized intrusion detection for secure cooperative multi\u2013agent systems. In: Proceedings of the 46th IEEE Conference on Decision and Control. IEEE, Amsterdam, pp. 1553\u20131558 (2007)","DOI":"10.1109\/CDC.2007.4434902"},{"issue":"1","key":"25_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2013-271","volume":"2013","author":"S Ganapathy","year":"2013","unstructured":"Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., Kannan, A.: Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J. Wirel. Commun. Netw. 2013(1), 1\u201316 (2013). \nhttps:\/\/doi.org\/10.1186\/1687-1499-2013-271","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"25_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TDSC.2008.20","volume":"7","author":"KK Gupta","year":"2010","unstructured":"Gupta, K.K., Nath, B., Kotagiri, R.: Layered approach using conditional random fields for intrusion detection. IEEE Trans. Dependable Secure Comput. 7(1), 35\u201349 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1016\/j.eswa.2011.09.073","volume":"39","author":"MM Kabir","year":"2012","unstructured":"Kabir, M.M., Shahjahan, M., Murase, K.: A new hybrid ant colony optimization algorithm for feature selection. Expert Syst. Appl. 39, 3747\u20133763 (2012)","journal-title":"Expert Syst. Appl."},{"key":"25_CR22","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/72.298224","volume":"5","author":"R Battiti","year":"1994","unstructured":"Battiti, R.: Using mutual information for selecting features in supervised neural net learning. IEEE Trans. Neural Netw. 5, 537\u2013550 (1994)","journal-title":"IEEE Trans. Neural Netw."},{"key":"25_CR23","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/72.977291","volume":"13","author":"N Kwak","year":"2002","unstructured":"Kwak, N., Choi, C.-H.: Input feature selection for classification problems. IEEE Trans. Neural Netw. 13, 143\u2013159 (2002)","journal-title":"IEEE Trans. Neural Netw."},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/LGRS.2007.905116","volume":"4","author":"R Archibald","year":"2007","unstructured":"Archibald, R., Fann, G.: Feature selection and classification of hyperspectral images with support vector machines. IEEE Geosci. Remote Sens. Lett. 4, 674\u2013677 (2007)","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"25_CR25","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/TNN.2010.2047114","volume":"21","author":"Z Xu","year":"2010","unstructured":"Xu, Z., King, I., Lyu, M.R.-T., Jin, R.: Discriminative semi-supervised feature selection via manifold regularization. IEEE Trans. Neural Netw. 21, 1033\u20131047 (2010)","journal-title":"IEEE Trans. Neural Netw."},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Liu, H.: Semi-supervised feature selection via spectral analysis. In: Proceedings of the 7th SIAM Data Mining Conference (SDM), pp. 641\u2013646 (2007)","DOI":"10.1137\/1.9781611972771.75"},{"key":"25_CR27","doi-asserted-by":"publisher","unstructured":"Mortazavi, A., Moattar, M.H.: Robust feature selection from microarray data based on cooperative game theory and qualitative mutual information. Adv. Bioinform. (2016). \nhttps:\/\/doi.org\/10.1155\/2016\/1058305","DOI":"10.1155\/2016\/1058305"},{"key":"25_CR28","first-page":"97","volume":"18","author":"T Dietterich","year":"1997","unstructured":"Dietterich, T.: Machine learning research: four current directions. Artif. Intell. Mag. 18, 97\u2013136 (1997)","journal-title":"Artif. Intell. Mag."},{"key":"25_CR29","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","volume":"45","author":"S Garcia","year":"2014","unstructured":"Garcia, S., et al.: An empirical comparison of botnet detection methods. Comput. Secur. J. 45, 100\u2013123 (2014)","journal-title":"Comput. Secur. J."}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6634-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:36:50Z","timestamp":1594996610000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6634-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811566332","9789811566349"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6634-9_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"354","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}