{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T01:01:24Z","timestamp":1772067684581,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2005,8,30]],"date-time":"2005-08-30T00:00:00Z","timestamp":1125360000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2005,8,30]],"date-time":"2005-08-30T00:00:00Z","timestamp":1125360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2006,6]]},"DOI":"10.1007\/s00500-005-0513-9","type":"journal-article","created":{"date-parts":[[2005,8,30]],"date-time":"2005-08-30T15:08:56Z","timestamp":1125414536000},"page":"699-714","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system"],"prefix":"10.1007","volume":"10","author":[{"given":"P.","family":"Ramasubramanian","sequence":"first","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,8,30]]},"reference":[{"issue":"2","key":"513_CR1","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/69.991718","volume":"14","author":"N Adam","year":"2002","unstructured":"Adam N, Atluri V, Bertino E, Ferrari E (2002) A content-based authorization model for digital libraries. IEEE Trans Know Data Eng 14(2):269\u2013315","journal-title":"IEEE Trans Know Data Eng"},{"issue":"1","key":"513_CR2","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/504909.504912","volume":"5","author":"Vijayalakshmi Atluri and Avigdor Gal","year":"2002","unstructured":"Vijayalakshmi Atluri and Avigdor Gal (2002) An authorization model for temporal and derived data:securing information portals. ACM Trans Inf Syst Sec 5(1):62\u201394","journal-title":"ACM Trans Inf Syst Sec"},{"key":"513_CR3","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1162\/neco.1989.1.1.151","volume":"1","author":"EB Baum","year":"1988","unstructured":"Baum EB, Haussler D (1988) What size net gives valid generalization?. Neural Comput 1:151\u2013160","journal-title":"Neural Comput"},{"key":"513_CR4","doi-asserted-by":"crossref","unstructured":"Chandramouli R (2001) A framework for multiple authorization types in a healthcare application system. In: 17th annual computer security applications conference(ACSAC'01), December 10\u201314, New Orleans, Lousiana, pp 137\u2013149","DOI":"10.1109\/ACSAC.2001.991530"},{"key":"513_CR5","unstructured":"Chung CY, Gertz M, Levitt K (1999) Misuse detection in database systems through user profiling. In: Web proceedings of the 2nd international workshop on the recent advances in intrusion detection(RAID'99), West Lafayette, Indiana"},{"key":"513_CR6","doi-asserted-by":"crossref","unstructured":"Christina Yip Chung, Michael Gertz, Karl Levitt (1999) DEMIDS: A misuse detection system for database systems. In: The third annual IFIP TC-11 WG 11.5 working conference on integrity and internal control in information systems, Kluwer, Dordrecht, pp 159\u2013178","DOI":"10.1007\/978-0-387-35501-6_12"},{"key":"513_CR7","doi-asserted-by":"crossref","unstructured":"Frank HF, Leung HK, Lam SH, Ling, Peter KS Tam (2003) Tuning of the structure and parameters of a neural network using an improved genetic algorithm. IEEE Trans Neural Netw 14(1):79\u201388","DOI":"10.1109\/TNN.2002.804317"},{"key":"513_CR8","doi-asserted-by":"crossref","unstructured":"Gal A, Atluri V (2000) An authorization model for temporal data. In: Proceedings of the Seventh ACM Conference on Computer and Communication Security, Athens, Greece, pp 144\u2013153","DOI":"10.1145\/352600.352621"},{"key":"513_CR9","unstructured":"Java Genetic Algorithms Package http:\/\/www.genetic-programming.org, Mar 2004"},{"key":"513_CR10","unstructured":"Domingo A, Gundin, Celiano Garcia, Eduardo Gomez, Yannis A (2002) Dimitriadis, guillermo vega. Short-term load forecasting for industrial customers using fasart and fasback neuro-fuzzy systems. In: Proceedings of the 14th IEEE power systems computation Conference, Sevilla, Spain, June 24\u201328, pp 221\u2013227"},{"key":"513_CR11","doi-asserted-by":"crossref","unstructured":"Ioannis G Damousis, Minas C Alexiadis, John B Theocharis, Petros S Dokopoulos (2004) A fuzzy model for wind speed prediction and power generation in wind parks using spatial correlation. IEEE Trans Energy Conversion 19(2):352\u2013361","DOI":"10.1109\/TEC.2003.821865"},{"key":"513_CR12","unstructured":"Java Programming Language http:\/\/www.java.sun.com, Mar 2005"},{"key":"513_CR13","unstructured":"Jonatan Gomez, Dipankar Dasgupta (2001) Evolving fuzzy classifiers for intrusion detection. Proceedings of the 2002 IEEE workshop on information assurance, United States Military Academy, West Point, NY"},{"key":"513_CR14","doi-asserted-by":"crossref","unstructured":"Jonatan Gomez, Dipankar Dasgupta, Olfa Nasraoui, Fabio Gonzalez (2002) Complete expression trees for evolving fuzzy classifiers systems with genetic algorithms and application to network intrusion detection. In: Proc of NAFIPS-FLINT Joint Conference, pp 469\u2013474, New Orleans, LA","DOI":"10.1109\/NAFIPS.2002.1018105"},{"issue":"4","key":"513_CR15","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/TIE.2003.814869","volume":"50","author":"SH Ling","year":"2003","unstructured":"Ling SH, Leung FHF, Lam HK, Lee YS, Tam PKS (2003) A novel GA-based neural network for short-term load forecasting. IEEE Trans Industrial Electronics 50(4):793\u2013799","journal-title":"IEEE Trans Industrial Electronics"},{"key":"513_CR16","doi-asserted-by":"crossref","unstructured":"Ling SH, Leung FHF, Lam HK, Tam PKS (2002) Short-term daily load forecasting in an intelligent home with GA-based neural network. In: Proc 2002 Int Joint Conf Neural Networks (IJCNN 2002), World Congress on Computational Intelligence (WCCI 2002), Honolulu, Hawaii, May 12\u201317, pp 997\u20131001","DOI":"10.1109\/IJCNN.2002.1005611"},{"key":"513_CR17","doi-asserted-by":"crossref","unstructured":"Lam HK, Ling SH, Leung FHF, Tam PKS (2001) Tuning of the structure and parameters of neural network using an improved genetic algorithm. In: Proc 27th Annual Conf of the IEEE Industrial Electronics Society (IECON 01), Denver, Colorado, 29 Nov 2, pp 25\u201330","DOI":"10.1109\/IECON.2001.976448"},{"key":"513_CR18","doi-asserted-by":"crossref","unstructured":"Michael CC, Anup Ghosh (2002) Simple, state-based approaches to program-based anomaly detection. ACM Trans Inf Syst Security 5(3):203\u2013237","DOI":"10.1145\/545186.545187"},{"key":"513_CR19","doi-asserted-by":"crossref","unstructured":"Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilbert (2002) Multivariate statistical analysis of audit trails for host-based intrusion detection. In: IEEE Trans Computers 51(7):810\u2013820","DOI":"10.1109\/TC.2002.1017701"},{"key":"513_CR20","doi-asserted-by":"crossref","unstructured":"Nong Ye, Sean Vilbert, Qiang Chen (2003) Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. In: IEEE Trans Reliability 52(1):73\u201382","DOI":"10.1109\/TR.2002.805796"},{"key":"513_CR21","doi-asserted-by":"crossref","unstructured":"Nong Ye, Qiang Chen, Connie M Borror (2004) EWMA Forecast of normal system activity for computer intrusion detection. IEEE Trans Reliability 53(4):557\u2013566","DOI":"10.1109\/TR.2004.837705"},{"key":"513_CR22","unstructured":"NIST\/SEMATECH e-Handbook of statistical methods. http:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/qqplot.htm, Mar 2005"},{"key":"513_CR23","unstructured":"http:\/\/download-west.oracle.com\/docs"},{"key":"513_CR24","unstructured":"Peng Liu (2001) DAIS: A real-time data attack isolation system for commercial database applications. In Proceedings of the 17th Annual Computer Security Applications Conference. IEEE Comput Soc pp 219\u2013229"},{"key":"513_CR25","unstructured":"Pikoulas J, Buchanan WJ, Manion M, Triantafyllopoulos K (2002) An intelligent agent intrusion system. In Proceedings of the 9th IEEE International Conference and Workshop on the Engineering of Computer Based Systems \u2013 ECBS. IEEE Comput Soc, Luden, Sweden, pp 94\u2013102"},{"key":"513_CR26","doi-asserted-by":"crossref","unstructured":"Pikoulas J, Buchanan WJ, Mannion M, Triantafyllopoulos K (2001) An agent-based Bayesian forecasting model for enhanced network security. In: Proceedings of the eighth annual IEEE international conference and workshop on the engineering of computer based systems-ECBS, IEEE Comput Soc, Los Alamitos, 17\u201320, pp 247\u2013254","DOI":"10.1109\/ECBS.2001.922429"},{"key":"513_CR27","doi-asserted-by":"crossref","unstructured":"Ramaswamy Chandramouli (2000) Application of XML tools for enterprise-wide RBAC implementation tasks. Proceedings of the fifth ACM workshop on Role-based access control, Berlin, Germany, July 26\u201327, 2000, pp 11\u201318","DOI":"10.1145\/344287.344297"},{"key":"513_CR28","doi-asserted-by":"crossref","unstructured":"Ramasubramanian P, Kannan A (2004) Intelligent multi-agent based back-propagation neural network forecasting model for database statistical anomaly prevention system proceedings of the international conference on IEEE ICISIP 2004 held on January 4\u20137, Chennai, India, p 108\u2013p113","DOI":"10.1109\/ICISIP.2004.1287634"},{"key":"513_CR29","doi-asserted-by":"crossref","unstructured":"Ramasubramanian P, Kannan A (2004) Intelligent multi-agent based database hybrid intrusion prevention system. In Proceedings of the Advances in Databases and Information Systems: 8th East European Conference (ADBIS 2004) held on September 22\u201325, Budapest, Hungary, Springer-Verlag, Lecture Notes in Artificial Intelligence, Vol 3255, pp 393\u2013408","DOI":"10.1007\/978-3-540-30204-9_27"},{"key":"513_CR30","unstructured":"Silvana Castano, Maria Grazia Fugini, Giancario Martella, Pierangela Samarati (1995) Database Security. Addison-Wesley"},{"key":"513_CR31","doi-asserted-by":"crossref","unstructured":"Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong (2002) Learning fingerprints for a database intrusion detection system. In Proceedings of the 7th European Symposium on Research in Computer Security, Zurich, Switzerland, pp 264\u2013280","DOI":"10.1007\/3-540-45853-0_16"},{"key":"513_CR32","doi-asserted-by":"crossref","unstructured":"Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung (2002) Intrusion detection using neural networks and support vector machines. In Proceedings of IEEE IJCNN, pp 1702\u20131707","DOI":"10.1007\/978-3-7908-1782-9_10"},{"key":"513_CR33","doi-asserted-by":"crossref","unstructured":"Tatyana Ryutov, Clifford Neuman, Dongho Kim, Li Zhou (2003) Integrated access control and intrusion detection for web servers. IEEE Trans Parallel and Distributed Systems 14(9):841\u2013850","DOI":"10.1109\/TPDS.2003.1233707"},{"key":"513_CR34","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1002\/for.844","volume":"21","author":"K Triantafyllopoulos","year":"2002","unstructured":"Triantafyllopoulos K, Pikoulas J (2002) Multivariate Bayesian regression applied to the problem of network security. J Forecasting 21:579\u2013594","journal-title":"J Forecasting"},{"key":"513_CR35","unstructured":"Java neural network simulator, Department of Computer Architecture, Wilhelm-Schickard-Institute For Computer Science, University Of T\u00fcbingen, http:\/\/www-ra.informatik.uni-tuebingen.de\/downloads\/JavaNNS"},{"issue":"9","key":"513_CR36","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1109\/TKDE.2004.43","volume":"16","author":"Tysen Leckie, Alec Yasinsac","year":"2004","unstructured":"Tysen Leckie, Alec Yasinsac (2004) Metadata for anomaly-based security protocol attack deduction. IEEE Trans Know and Data Engineering 16(9):1157\u20131168","journal-title":"IEEE Trans Know and Data Engineering"},{"key":"513_CR37","unstructured":"Wai Lup Low, Joseph Lee, Peter Teoh (2002) DIDAFIT: Detecting intrusions in databases through fingerprinting transactions. In Proceedings of the 4th International Conference on Enterprise Information Systems, Ciudad Real, Spain, April 2\u20136, pp 121\u2013128"},{"key":"513_CR38","doi-asserted-by":"crossref","unstructured":"Wenke Lee, Salvatore J Stolfo (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Security 3(4):227\u2013261","DOI":"10.1145\/382912.382914"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-005-0513-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-005-0513-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-005-0513-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-005-0513-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T21:14:35Z","timestamp":1735938875000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-005-0513-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8,30]]},"references-count":38,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2006,6]]}},"alternative-id":["513"],"URL":"https:\/\/doi.org\/10.1007\/s00500-005-0513-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,8,30]]},"assertion":[{"value":"30 August 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}