{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:44:50Z","timestamp":1743057890907,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_21","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"292-305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm"],"prefix":"10.1007","author":[{"given":"Chenjun","family":"Tang","sequence":"first","affiliation":[]},{"given":"Hai","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shijie","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"2","key":"21_CR1","first-page":"146","volume":"60","author":"Z Sun","year":"2020","unstructured":"Sun, Z., Strang, K.D., Pambel, F.: Privacy and security in the big data paradigm. J. Comput. Inf. Syst. 60(2), 146\u2013155 (2020)","journal-title":"J. Comput. Inf. Syst."},{"issue":"3","key":"21_CR2","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11235-019-00614-3","volume":"73","author":"RB Benisha","year":"2019","unstructured":"Benisha, R.B., Raja Ratna, S.: Detection of interruption attack in the wireless networked closed loop industrial control systems. Telecommun. Syst. 73(3), 359\u2013370 (2019). https:\/\/doi.org\/10.1007\/s11235-019-00614-3","journal-title":"Telecommun. Syst."},{"issue":"2","key":"21_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.3389\/fnhum.2019.00052","volume":"13","author":"X Wang","year":"2019","unstructured":"Wang, X., Gong, G., Li, N., Qiu, S.: Detection analysis of epileptic EEG using a novel random forest model combined with grid search optimization. Front. Hum. Neurosci. 13(2), 52\u201364 (2019)","journal-title":"Front. Hum. Neurosci."},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"180235","DOI":"10.1109\/ACCESS.2019.2952107","volume":"7","author":"A Javeed","year":"2019","unstructured":"Javeed, A., Zhou, S., Yongjian, L., Qasim, I., Noor, A., Nour, R.: An intelligent learning system based on random search algorithm and optimized random forest model for improved heart disease detection. IEEE Access 7, 180235\u2013180243 (2019)","journal-title":"IEEE Access"},{"issue":"6","key":"21_CR5","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TPDS.2011.262","volume":"23","author":"S Yu","year":"2012","unstructured":"Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discriminating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073\u20131080 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cose.2014.07.005","volume":"46","author":"A Almalawi","year":"2014","unstructured":"Almalawi, A., Yu, X., Tari, Z., Fahad, A., Khalil, I.: An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Comput. Secur. 46, 94\u2013110 (2014)","journal-title":"Comput. Secur."},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"50850","DOI":"10.1109\/ACCESS.2018.2868993","volume":"6","author":"K Wu","year":"2018","unstructured":"Wu, K., Chen, Z., Li, W.: A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6, 50850\u201350859 (2018)","journal-title":"IEEE Access"},{"key":"21_CR8","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1007\/978-94-007-2169-2_146","volume-title":"Green Communications and Networks","author":"F Wu","year":"2012","unstructured":"Wu, F.: Information fusion and intelligent pattern recognition for network intrusion in industrial network systems based on ICA and PSO-ANN. In: Yang, Y., Ma, M. (eds.) Green Communications and Networks. LNEE, vol. 113, pp. 1247\u20131254. Springer, Dordrecht (2012). https:\/\/doi.org\/10.1007\/978-94-007-2169-2_146"},{"key":"21_CR9","first-page":"380","volume":"2015","author":"L Deng","year":"2017","unstructured":"Deng, L., Peng, Y., Liu, C., Xin, X., Xie, Y.: Intrusion detection method based on support vector machine access of modbus TCP protocol. IEEE Smart Data 2015, 380\u2013383 (2017)","journal-title":"IEEE Smart Data"},{"issue":"1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/TC.2013.191","volume":"64","author":"S Yu","year":"2015","unstructured":"Yu, S., Guo, S., Stojmenovic, I.: Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans. Comput. 64(1), 139\u2013151 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Jiang, J., Wang, Q., Shi, Z., Lv, B., Qi, B.: RST-RF: a hybrid model based on rough set theory and random forest for network intrusion detection. In: ACM International Conference Proceeding Series, pp. 77\u201381 (2018)","DOI":"10.1145\/3199478.3199489"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Anton, S.D., Sinha, S., Dieter Schotten, H.: Anomaly-based intrusion detection in industrial data with SVM and random forests. In: 2019 27th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2019, pp. 10\u201315 (2019)","DOI":"10.23919\/SOFTCOM.2019.8903672"},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"AL Buczak","year":"2016","unstructured":"Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153\u20131176 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"149398","DOI":"10.1109\/ACCESS.2019.2945596","volume":"7","author":"NA Golilarz","year":"2019","unstructured":"Golilarz, N.A., Addeh, A., Gao, H., Ali, L., Roshandeh, A.M., Mudassir Munir, H., Khan, R.U.: A new automatic method for control chart patterns recognition based on convnet and harris hawks meta heuristic optimization algorithm. IEEE Access 7, 149398\u2013149405 (2019)","journal-title":"IEEE Access"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Wang, C.F., Liu, S.Y., Zheng, G.Z.: A branch-and-reduce approach for solving generalized linear multiplicative programming. Math. Probl. Eng. 2011 (2011)","DOI":"10.1155\/2011\/409491"},{"issue":"1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2019","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., Pilli, E.S.: A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tutor. 21(1), 686\u2013728 (2019)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"11426","DOI":"10.1109\/ACCESS.2019.2962622","volume":"8","author":"Y Li","year":"2020","unstructured":"Li, Y., Liu, G., Li, T., Jiao, L., Lu, G., Marturi, N.: Application of data driven optimization for change detection in synthetic aperture radar images. IEEE Access 8, 11426\u201311436 (2020)","journal-title":"IEEE Access"},{"issue":"11","key":"21_CR18","doi-asserted-by":"publisher","first-page":"1652","DOI":"10.1002\/tee.22987","volume":"14","author":"T Gu","year":"2019","unstructured":"Gu, T., Chen, H., Chang, L., Li, L.: Intrusion detection system based on improved abc algorithm with tabu search. IEEJ Trans. Electr. Electron. Eng. 14(11), 1652\u20131660 (2019)","journal-title":"IEEJ Trans. Electr. Electron. Eng."},{"issue":"4","key":"21_CR19","first-page":"330","volume":"1","author":"XS Yang","year":"2010","unstructured":"Yang, X.S., Deb, S.: Engineering optimisation by cuckoo search. Int. J. Math. Modell. Numer. Optim. 1(4), 330\u2013343 (2010)","journal-title":"Int. J. Math. Modell. Numer. Optim."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Yang, X.S., Deb, S.: Cuckoo search via L\u00e9vy flights. In: 2009 World Congress on Nature and Biologically Inspired Computing, NABIC 2009, pp. 210\u2013214 (2009)","DOI":"10.1109\/NABIC.2009.5393690"},{"issue":"9","key":"21_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MC.2016.292","volume":"49","author":"XS Yang","year":"2016","unstructured":"Yang, X.S.: From swarm intelligence to metaheuristics: nature-inspired optimization algorithms. Computer 49(9), 52\u201359 (2016)","journal-title":"Computer"},{"key":"21_CR22","doi-asserted-by":"publisher","first-page":"2272","DOI":"10.1109\/ACCESS.2019.2962276","volume":"8","author":"X Huang","year":"2020","unstructured":"Huang, X., Xie, Z., Huang, X.: Fault location of distribution network base on improved cuckoo search algorithm. IEEE Access 8, 2272\u20132283 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"21_CR23","first-page":"8","volume":"45","author":"H Chen","year":"2019","unstructured":"Chen, H., Wang, H., Yan, B.: Application of CUDA and cuckoo algorithm based SVM in industrial control system intrusion detection (in Chinese). J. East China Univ. Sci. Technol. 45(1), 8\u201316 (2019)","journal-title":"J. East China Univ. Sci. Technol."},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/j.asoc.2015.10.039","volume":"38","author":"MK Naik","year":"2016","unstructured":"Naik, M.K., Panda, R.: A novel adaptive cuckoo search algorithm for intrinsic discriminant analysis based face recognition. Appl. Soft Comput. J. 38, 661\u2013675 (2016)","journal-title":"Appl. Soft Comput. J."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:28:33Z","timestamp":1619317713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}