{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:46:51Z","timestamp":1743061611725,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811659423"},{"type":"electronic","value":"9789811659430"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-5943-0_15","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T23:04:08Z","timestamp":1631228648000},"page":"179-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Design and Implementation of Intrusion Detection System Based on Neural Network"],"prefix":"10.1007","author":[{"given":"Zengyu","family":"Cai","sequence":"first","affiliation":[]},{"given":"Jingchao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"issue":"13","key":"15_CR1","doi-asserted-by":"publisher","first-page":"4185","DOI":"10.1007\/s00500-017-2708-2","volume":"22","author":"C Yin","year":"2017","unstructured":"Yin, C., Xia, L., Zhang, S., Sun, R., Wang, J.: Improved clustering algorithm based on high-speed network data stream. Soft. Comput. 22(13), 4185\u20134195 (2017). https:\/\/doi.org\/10.1007\/s00500-017-2708-2","journal-title":"Soft. Comput."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, R., et al.: An intrusion detection scheme based on repeated game in smart home. Mob. Inf. Syst. 2020, 9 (2020). Article ID. 8844116","DOI":"10.1155\/2020\/8844116"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.compeleceng.2017.09.028","volume":"65","author":"X Zou","year":"2018","unstructured":"Zou, X., Cao, J.H., Guo, Q., Wen, T.: A novel network security algorithm based on improved support vector machine from smart city perspective. Comput. Electr. Eng. 65, 67\u201378 (2018)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1504\/IJSNET.2017.083410","volume":"23","author":"J Jow","year":"2017","unstructured":"Jow, J., Xiao, Y., Han, W.L.: A survey of intrusion detection systems in smart grid. Int. J. Sensor Netw. 23(3), 170\u2013186 (2017)","journal-title":"Int. J. Sensor Netw."},{"issue":"7","key":"15_CR5","doi-asserted-by":"publisher","first-page":"5521","DOI":"10.1007\/s11227-019-02899-2","volume":"76","author":"X Zuo","year":"2019","unstructured":"Zuo, X., Chen, Z., Dong, L., Chang, J., Hou, B.: Power information network intrusion detection based on data mining algorithm. J. Supercomput. 76(7), 5521\u20135539 (2019). https:\/\/doi.org\/10.1007\/s11227-019-02899-2","journal-title":"J. Supercomput."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Alhakami, W.: Alerts clustering for intrusion detection systems: overview and machine learning perspectives. Int. J. Adv. Comput. Sci. Appl. 10(5), 1\u201310 (2019)","DOI":"10.14569\/IJACSA.2019.0100574"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Li, X.K., Chen, W., Zhang, Q.R., Wu, L.F.: Building auto-encoder intrusion detection system based on random forest feature selection. Comput. Secur. 95 (2020). Article ID. 101851","DOI":"10.1016\/j.cose.2020.101851"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J., Alazaab, A.: Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine. Electronics 9, 173 (2020)","DOI":"10.3390\/electronics9010173"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad, I., Basheri, M., Iqbal, M.J., Rahim, A.: Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access 6, 33789\u201333795 (2018)","journal-title":"IEEE Access"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296\u2013303 (2017)","journal-title":"Expert Syst. Appl."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Wei, J.X., Long, C., Li, J.W., Zhao, J.: An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing. Concurrency Comput. Pract. Exp. 32(24), e5922 (2020)","DOI":"10.1002\/cpe.5922"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Liu, G.J., Zhang, J.B.: CNID: research of network intrusion detection based on convolutional neural network. Discrete Dyn. Nat. Soc. 2020, 11 (2020)","DOI":"10.1155\/2020\/4705982"},{"issue":"6","key":"15_CR13","doi-asserted-by":"publisher","first-page":"7623","DOI":"10.3233\/JIFS-179833","volume":"38","author":"H Wang","year":"2020","unstructured":"Wang, H., Cao, Z.J., Hong, B.: A network intrusion detection system based on convolutional neural network. J. Intell. Fuzzy Syst. 38(6), 7623\u20137637 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"4","key":"15_CR14","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1049\/cje.2017.03.011","volume":"26","author":"P Li","year":"2017","unstructured":"Li, P., et al.: Intrusion detection methods based on incomplete RFID traces. Chin. J. Electron. 26(4), 675\u2013680 (2017)","journal-title":"Chin. J. Electron."},{"issue":"1","key":"15_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-016-0076-z","volume":"6","author":"N Keegan","year":"2016","unstructured":"Keegan, N., Ji, S.-Y., Chaudhary, A., Concolato, C., Yu, B., Jeong, D.H.: A survey of cloud-based network intrusion detection analysis. HCIS 6(1), 1\u201316 (2016). https:\/\/doi.org\/10.1186\/s13673-016-0076-z","journal-title":"HCIS"},{"key":"15_CR16","unstructured":"Khan, R., Al-Shehri, M.: A futuristic analysis approach of neural network for intrusion detection system. Dilemas Contemporaneos-Educacion Politica Y Valores 6(3), 1\u201316 (2019)"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1419-z","volume":"2019","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Zhu, L.: A new intrusion detection and alarm correlation technology based on neural network. EURASIP J. Wirel. Commun. Netw. 2019(1), 1 (2019). https:\/\/doi.org\/10.1186\/s13638-019-1419-z","journal-title":"EURASIP J. Wirel. Commun. Netw."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-5943-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:50:53Z","timestamp":1710348653000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-5943-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811659423","9789811659430"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-5943-0_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.icpcsee.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"256","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}