{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T07:55:35Z","timestamp":1761292535576},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,5,31]],"date-time":"2008-05-31T00:00:00Z","timestamp":1212192000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s00500-008-0322-z","type":"journal-article","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T06:58:37Z","timestamp":1212130717000},"page":"273-290","source":"Crossref","is-referenced-by-count":11,"title":["Intrusion detection using a linguistic hedged fuzzy-XCS classifier system"],"prefix":"10.1007","volume":"13","author":[{"given":"Javier G.","family":"Mar\u00edn-Bl\u00e1zquez","sequence":"first","affiliation":[]},{"given":"Gregorio","family":"Mart\u00ednez P\u00e9rez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,31]]},"reference":[{"key":"322_CR1","doi-asserted-by":"crossref","unstructured":"Bonarini A (1999) An introduction to learning fuzzy classifier systems. In: IWLCS, vol 1813. Springer, Heidelberg","DOI":"10.1007\/3-540-45027-0_4"},{"issue":"3\u20134","key":"322_CR2","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/s005000100111","volume":"6","author":"MV Butz","year":"2002","unstructured":"Butz MV, Wilson SW: An algorithmic description of XCS. J Soft Comput 6(3\u20134), 144\u2013153 (2002)","journal-title":"J Soft Comput"},{"issue":"1","key":"322_CR3","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/TEVC.2003.818194","volume":"8","author":"M Butz","year":"2004","unstructured":"Butz M, Kovacs T, Lanzi PL, Wilson SW: Toward a theory of generalization and learning in XCS. IEEE Trans Evol Comput 8(1), 28\u201346 (2004a)","journal-title":"IEEE Trans Evol Comput"},{"key":"322_CR4","unstructured":"Butz MV, Goldberg DE, Lanzi PL, Sastry K (2004b) Bounding the population size to ensure niche support in XCS. Technical report 2004033, IlliGAl, July"},{"issue":"4","key":"322_CR5","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TFUZZ.2007.900904","volume":"15","author":"J Casillas","year":"2007","unstructured":"Casillas J, Carse B, Bull L: Fuzzy-xcs: a michigan genetic fuzzy system. IEEE Trans Fuzzy Syst 15(4), 536\u2013550 (2007)","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"322_CR6","volume-title":"Empirical methods for artificial intelligence","author":"PR Cohen","year":"1995","unstructured":"Cohen PR: Empirical methods for artificial intelligence. MII Press, Cambridge (1995)"},{"key":"322_CR7","doi-asserted-by":"crossref","DOI":"10.1142\/4177","volume-title":"Genetic fuzzy systems","author":"O Cord\u00f3n","year":"2001","unstructured":"Cord\u00f3n O, Herrera F, Hoffmann F, Magdalena L: Genetic fuzzy systems. World Scientific, Singapore (2001)"},{"key":"322_CR8","volume-title":"The fuzzy systems handbook","author":"E Cox","year":"1994","unstructured":"Cox E: The fuzzy systems handbook. Academic Press Inc., Cambridge (1994)"},{"issue":"2","key":"322_CR9","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"DE Denning","year":"1987","unstructured":"Denning DE: An intrusion-detection model. IEEE Trans Softw Eng 13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"322_CR10","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C Elkan","year":"2000","unstructured":"Elkan C: Results of the KDD\u201999 classifier learning. SIGKDD Explor 1(2), 63\u201364 (2000)","journal-title":"SIGKDD Explor"},{"issue":"1","key":"322_CR11","first-page":"79","volume":"3","author":"KM Faraoun","year":"2006","unstructured":"Faraoun KM, Boukelif A: Genetic programming approach for multi-category pattern classification applied to network intrusions detection. Int J Comput Intell 3(1), 79\u201390 (2006)","journal-title":"Int J Comput Intell"},{"key":"322_CR12","volume-title":"Genetic algorithms in search, optimization and machine learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE: Genetic algorithms in search, optimization and machine learning. Addison-Wesley, Reading (1989)"},{"issue":"2","key":"322_CR13","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0165-0114(97)00206-6","volume":"104","author":"AF G\u00f3mez Skarmeta","year":"1999","unstructured":"G\u00f3mez Skarmeta AF, Jimenez F: Fuzzy modeling with hybrid systems. Fuzzy Sets Syst 104(2), 199\u2013208 (1999)","journal-title":"Fuzzy Sets Syst"},{"issue":"1","key":"322_CR14","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.ijar.2006.01.004","volume":"44","author":"H Ishibuchi","year":"2007","unstructured":"Ishibuchi H, Nojima Y: Analysis of interpretability-accuracy tradeoff of fuzzy systems by multiobjective fuzzy genetics-based machine learning. Int J Approx Reason 44(1), 4\u201331 (2007)","journal-title":"Int J Approx Reason"},{"key":"322_CR15","volume-title":"Neuro-fuzzy and soft computing","author":"J-SR Jang","year":"1997","unstructured":"Jang J-SR, Sun C-T, Mizutani E: Neuro-fuzzy and soft computing. Matlab Curriculum, Prentice Hall (1997)"},{"key":"322_CR16","doi-asserted-by":"crossref","unstructured":"Kovacs T (2004) Strength or accuracy: credit assignment in learning classifier systems. Distinguished dissertations. Springer, Heidelberg","DOI":"10.1007\/978-0-85729-416-6"},{"key":"322_CR17","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Ert\u00f6z L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: SDM. SIAM","DOI":"10.1137\/1.9781611972733.3"},{"issue":"4","key":"322_CR18","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W Lee","year":"2000","unstructured":"Lee W, Stolfo SJ: A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Secur 3(4), 227\u2013261 (2000)","journal-title":"ACM Trans Inf Syst Secur"},{"key":"322_CR19","unstructured":"Leung K, Leckie C (2005) Unsupervised anomaly detection in network intrusion detection using clusters. In: ACSC, vol 38. Australian Computer Society"},{"issue":"3","key":"322_CR20","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1162\/106365603322365289","volume":"11","author":"EB Mansilla","year":"2003","unstructured":"Mansilla EB, Garrell Guiu JM: Accuracy-based learning classifier systems: models, analysis and applications to classification tasks. Evol Comput 11(3), 209\u2013238 (2003)","journal-title":"Evol Comput"},{"key":"322_CR21","doi-asserted-by":"crossref","unstructured":"Mar\u00edn-Bl\u00e1zquez JG, Shen Q (2001) Linguistic hedges on trapezoidal fuzzy sets: a revisit. In: Proceedings of the 10th IEEE international conference on fuzzy systems, vol 1, pp 412\u2013415","DOI":"10.1109\/FUZZ.2001.1007336"},{"key":"322_CR22","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1109\/TFUZZ.2002.800687","volume":"10","author":"JG Mar\u00edn-Bl\u00e1zquez","year":"2002","unstructured":"Mar\u00edn-Bl\u00e1zquez JG, Shen Q: From approximative to descriptive fuzzy classifiers. IEEE Trans Fuzzy Syst 10, 484\u2013497 (2002)","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"322_CR23","unstructured":"Mar\u00edn-Bl\u00e1zquez JG, Mart\u00ednez P\u00e9rez G, Gil P\u00e9rez M (2007a) Gesti\u00f3n de intrusiones mediante el sistema de clasificadores XCS. In: (MAEB07), Tenerife"},{"key":"322_CR24","doi-asserted-by":"crossref","unstructured":"Mar\u00edn-Bl\u00e1zquez JG, Mart\u00ednez P\u00e9rez G, Gil P\u00e9rez M (2007b) A linguistic fuzzy-XCS classifier system. In: FUZZIEEE 2007, London","DOI":"10.1109\/FUZZY.2007.4295593"},{"issue":"4","key":"322_CR25","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh J: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst Secur 3(4), 262\u2013294 (2000)","journal-title":"ACM Trans Inf Syst Secur"},{"key":"322_CR26","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"GA Miller","year":"1956","unstructured":"Miller GA: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol Rev 63, 81\u201397 (1956)","journal-title":"Psychol Rev"},{"key":"322_CR27","doi-asserted-by":"crossref","unstructured":"Oldmeadow J, Ravinutala S, Leckie C (2004) Adaptive clustering for network intrusion detection. In: Dai H, Srikant R, Zhang C (eds) PAKDD, vol 3056. Lecture notes in computer science, pp 255\u2013259. Springer, Heidelberg","DOI":"10.1007\/978-3-540-24775-3_33"},{"key":"322_CR28","doi-asserted-by":"crossref","unstructured":"Orriols A, Bernad\u00f3-Mansilla E (2005) The class imbalance problem in learning classifier systems: a preliminary study. In: Genetic and evolutionary computation conference (GECCO2005) workshop program, pp 74\u201378. ACM Press, Washington DC, 25\u201329 June 2005","DOI":"10.1145\/1102256.1102271"},{"key":"322_CR29","doi-asserted-by":"crossref","unstructured":"Orriols-Puig A, Bernad\u00f3-Mansilla E (2006) Bounding XCS\u2019s parameters for unbalanced datasets. In: GECCO 2006:, vol 2, pp 1561\u20131568","DOI":"10.1145\/1143997.1144250"},{"key":"322_CR30","volume-title":"C4.5: Programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR: C4.5: Programs for machine learning. Morgan Kaufmann, San Mateo (1993)"},{"key":"322_CR31","unstructured":"Sabhnani M, Serpen G (2003) Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context. In: MLMTA. CSREA Press"},{"issue":"3","key":"322_CR32","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/TEVC.2004.841683","volume":"9","author":"D Song","year":"2005","unstructured":"Song D, Heywood MI, Zincir-Heywood AN: Training genetic programming on half a million patterns: an example from anomaly detection. IEEE Trans Evol Comput 9(3), 225\u2013239 (2005)","journal-title":"IEEE Trans Evol Comput"},{"issue":"3","key":"322_CR33","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1162\/106365603322365315","volume":"11","author":"C Stone","year":"2003","unstructured":"Stone C, Bull L: For real! XCS with continuous-valued inputs. Evol Comput 11(3), 298\u2013336 (2003)","journal-title":"Evol Comput"},{"key":"322_CR34","unstructured":"Uci machine learning databases (2007). http:\/\/www.ics.uci.edu\/mlearn\/\/MLRepository.html"},{"issue":"1","key":"322_CR35","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/3468.736369","volume":"29","author":"J Valentede de Oliveira","year":"1999","unstructured":"Valentede de Oliveira J: Semantic constrains for membership function optimization. IEEE Trans Syst Man Cybern Part A 29(1), 128\u2013138 (1999)","journal-title":"IEEE Trans Syst Man Cybern Part A"},{"issue":"2","key":"322_CR36","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1162\/evco.1995.3.2.149","volume":"3","author":"SW Wilson","year":"1995","unstructured":"Wilson SW: Classifier systems based on accuracy. Evol Comput 3(2), 149\u2013175 (1995)","journal-title":"Evol Comput"},{"key":"322_CR37","doi-asserted-by":"crossref","unstructured":"Wilson SW (1999) Get real! XCS with continuous-valued inputs. In: IWLCS, vol 1813. Springer, Heidelberg","DOI":"10.1007\/3-540-45027-0_11"},{"key":"322_CR38","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","volume":"8","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA: The concept of a linguistic variable and its application to approximate reasoning I. Inf Sci 8, 199\u2013249 (1975)","journal-title":"Inf Sci"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0322-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-008-0322-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-008-0322-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T21:39:54Z","timestamp":1559079594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-008-0322-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,31]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["322"],"URL":"https:\/\/doi.org\/10.1007\/s00500-008-0322-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5,31]]}}}