{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:02:23Z","timestamp":1742929343867,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811604218"},{"type":"electronic","value":"9789811604225"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-0422-5_11","type":"book-chapter","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T04:28:11Z","timestamp":1612931291000},"page":"152-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"key":"11_CR1","unstructured":"Frank, E., Hall, M.A., Witten, I.H.: The WEKA Workbench, in Data Mining: Practical Machine Learning Tools and Techniques, M. Kaufmann, Ed., 4th ed. (2016). https:\/\/www.cs.waikato.ac.nz\/ml\/weka\/Witten_et_al_2016_appendix.pdf"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"LN de Castro","year":"2002","unstructured":"de Castro, L.N., Von Zuben, F.J.: Learning and optimization using the clonal selection principle. IEEE Trans. Evol. Comput. 6(3), 239\u2013251 (2002). https:\/\/doi.org\/10.1109\/TEVC.2002.1011539","journal-title":"IEEE Trans. Evol. Comput."},{"key":"11_CR3","unstructured":"de Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering applications. In: editor (ed.) Proceedings of GECCO, vol. 2000, pp. 36\u201339 (2000)"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Kohonen, T.: Self-Organizing Map. Springer Science & Business Media, New York (2001). https:\/\/doi.org\/10.1007\/978-3-642-56927-2","DOI":"10.1007\/978-3-642-56927-2"},{"key":"11_CR5","unstructured":"The Genius Blog. Basics of multilayer perceptron \u2013 a simple explanation of multilayer perceptron (2018). https:\/\/kindsonthegenius.com\/blog\/2018\/01\/basics-of-multilayer-perceptron-a-simple-explanation-of-multilayer-perceptron.html"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.istr.2005.08.001","volume":"10","author":"A Fuchsberger","year":"2005","unstructured":"Fuchsberger, A.: Intrusion detection systems and intrusion prevention systems. Inf. Secur. Techn. Report 10, 134\u2013139 (2005). https:\/\/doi.org\/10.1016\/j.istr.2005.08.001","journal-title":"Inf. Secur. Techn. Report"},{"key":"11_CR7","unstructured":"Hurwitz, J., Kirsch, D.: Machine Learning for dummies. John Wiley & Sons Inc, New Jersey (2018)"},{"key":"11_CR8","unstructured":"IBM. What is machine learning? (2020). https:\/\/www.ibm.com\/topics\/machine-learning"},{"key":"11_CR9","unstructured":"Jones, M.T.: Unsupervised learning for data classification (2017). https:\/\/developer.ibm.com\/articles\/cc-unsupervised-learning-data-classification\/"},{"key":"11_CR10","unstructured":"Jones, M.T.: Supervised learning models (2018). https:\/\/developer.ibm.com\/articles\/cc-supervised-learning-models\/"},{"key":"11_CR11","unstructured":"Canadian Institute for Cybersecurity: Cse-cic-ids2018 on aws. A collab-orative project between the communications security establishment (cse) & the canadian institute for cybersecurity (cic), University of New Brunswick (2020). https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html"},{"issue":"3\u20134","key":"11_CR12","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1080\/23742917.2018.1518061","volume":"2","author":"AM Al Tobi","year":"2018","unstructured":"Al Tobi, A.M., Duncan, I.: Kdd 1999 generation faults: A review and analysis. J. Cyber Secur. Technol. 2(3\u20134), 164\u2013200 (2018)","journal-title":"J. Cyber Secur. Technol."},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and1999 darpa intrusion detection system evaluations as performed by lincolnlaboratory. ACM Trans. Inf. Syst. Secur. (TISSEC) 3(4), 262\u2013294 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"3","key":"11_CR14","doi-asserted-by":"publisher","first-page":"259","DOI":"10.7763\/IJMLC.2013.V3.315","volume":"3","author":"M Mahboubian","year":"2013","unstructured":"Mahboubian, M., Hamid, N.A.W.A.: A machine learning based ais ids. Int. J. Mach. Learn. Comput. 3(3), 259\u2013262 (2013). https:\/\/doi.org\/10.7763\/IJMLC.2013.V3.315","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"10","key":"11_CR15","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S Forrest","year":"1997","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.: Computer immunology. Commun. ACM 40(10), 88\u201396 (1997)","journal-title":"Commun. ACM"},{"issue":"4","key":"11_CR16","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11047-006-9026-4","volume":"6","author":"J Kim","year":"2007","unstructured":"Kim, J., Bentley, P.J., Aickelin, U., Greensmith, J., Tedesco, G., Twycross, J.: Immune system approaches to intrusion detection-a review. Nat. Comput. 6(4), 413\u2013466 (2007)","journal-title":"Nat. Comput."},{"key":"11_CR17","unstructured":"Brownlee, J.: Learning vector quantization for machine learning (2020). https:\/\/machinelearningmastery.com\/learning-vector-quantization-for-machine-learning\/"},{"key":"11_CR18","unstructured":"Dem\u0161ar, J., et aL.: Orange: data mining toolbox in python. J. Mach. Learn. Res. 14, 2349\u20132353 (2013). http:\/\/jmlr.org\/papers\/v14\/demsar13a.html"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-0422-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:15:57Z","timestamp":1619316957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-0422-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811604218","9789811604225"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-0422-5_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/2020\/sscc2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}