{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:28:04Z","timestamp":1771468084089,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,6,22]],"date-time":"2014-06-22T00:00:00Z","timestamp":1403395200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s00500-014-1332-7","type":"journal-article","created":{"date-parts":[[2014,6,21]],"date-time":"2014-06-21T05:13:25Z","timestamp":1403327605000},"page":"1187-1199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":99,"title":["A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection"],"prefix":"10.1007","volume":"19","author":[{"given":"Fangjun","family":"Kuang","sequence":"first","affiliation":[]},{"given":"Siyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Weihong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,22]]},"reference":[{"key":"1332_CR1","doi-asserted-by":"crossref","unstructured":"Chen ZG, Ren HD, Du XJ (2008) Minimax probability machine classifier with feature extraction by kernel PCA for intrusion detection. In: Proceedings of WiCOM08, pp 1\u20134","DOI":"10.1109\/WiCom.2008.1101"},{"key":"1332_CR2","doi-asserted-by":"crossref","unstructured":"Chimphlee W, Addullah AH, Sap MNM et al (2006) Anomaly-based intrusion detection using fuzzy rough clustering. In: Proceedings of ICHIT06, pp 329\u2013334","DOI":"10.1109\/ICHIT.2006.253508"},{"key":"1332_CR3","first-page":"288","volume":"59","author":"M Ding","year":"2009","unstructured":"Ding M, Tian Z, Xu H (2009) Adaptive kernel principal analysis for online feature extraction. Proc World Acad Sci Eng Technol 59:288\u2013293","journal-title":"Proc World Acad Sci Eng Technol"},{"key":"1332_CR4","unstructured":"Eskin E (2000) Anomaly detection over noisy data using learned probability distributions. In: Proceedings of ICML2000, pp 255\u2013262"},{"key":"1332_CR5","unstructured":"Fei R, Hu L, Liang H (2008) Using density-based incremental clustering for anomaly detection. In: Proceedings of CSSE08, pp 986\u2013989"},{"key":"1332_CR6","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"SJ Horng","year":"2011","unstructured":"Horng SJ, Su MY, Chen YH et al (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst Appl 38:306\u2013313","journal-title":"Expert Syst Appl"},{"key":"1332_CR7","unstructured":"Hsu CW, Chang CC, Lin C J (2010) A practical guide to support vector classification. http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/guide\/guide.pdf . Accessed 2 December 2011"},{"key":"1332_CR8","unstructured":"Hu W, Liao Y, Vemuri V (2003) Robust support vector machines for anomaly detection in computer security. In: Proceedings of ICMLA03, pp 23\u201324"},{"key":"1332_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1904-8","volume-title":"Principle component Analysis","author":"IT Jolliffe","year":"1986","unstructured":"Jolliffe IT (1986) Principle component Analysis. Springer, New York"},{"key":"1332_CR10","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.knosys.2011.12.004","volume":"28","author":"B Kavitha","year":"2012","unstructured":"Kavitha B, Karthikeyan S, Maybell PS (2012) An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier. Knowl Based Syst 28:88\u201396","journal-title":"Knowl Based Syst"},{"key":"1332_CR11","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan L, Awad M, Thuraisingham B (2007) A new intrusion detection system using support vector machines and hierarchical clustering. Int J Very Large Data Bases 16:507\u2013521","journal-title":"Int J Very Large Data Bases"},{"key":"1332_CR12","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1016\/j.cose.2011.08.009","volume":"30","author":"C Kolias","year":"2011","unstructured":"Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30:625\u2013642","journal-title":"Comput Secur"},{"issue":"8","key":"1332_CR13","first-page":"3237","volume":"8","author":"FJ Kuang","year":"2012","unstructured":"Kuang FJ, Xu WH, Zhang SY et al (2012) A novel approach of KPCA and SVM for intrusion detection. J Comput Inform Syst 8(8):3237\u20133244","journal-title":"J Comput Inform Syst"},{"key":"1332_CR14","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.asoc.2014.01.028","volume":"18","author":"FJ Kuang","year":"2014","unstructured":"Kuang FJ, Xu WH, Zhang SY (2014) A novel hybrid KPCA and SVM with GA model for intrusion detection. Appl Soft Comput 18:178\u2013184","journal-title":"Appl Soft Comput"},{"key":"1332_CR15","doi-asserted-by":"crossref","unstructured":"Lee JH, Lee JH, Sohn SG, et al (2008) Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. In: Proceedings of ICACT08, pp 1170\u20131175","DOI":"10.1109\/ICACT.2008.4493974"},{"issue":"4","key":"1332_CR16","first-page":"613","volume":"14","author":"B Li","year":"1997","unstructured":"Li B, Jiang WS (1997) Chaos optimization method and its application. Control Theory Appl 14(4):613\u2013615","journal-title":"Control Theory Appl"},{"issue":"1","key":"1332_CR17","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S Peddabachigari","year":"2007","unstructured":"Peddabachigari S, Abraham A, Grosan C (2007) Modeling intrusion detection system using hybrid intelligent systems. J Netw Comput Appl 30(1):114\u2013132","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"1332_CR18","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1162\/089976698300017467","volume":"10","author":"B Sch\u00f6lkopf","year":"1998","unstructured":"Sch\u00f6lkopf B, Smola A, M\u00fcller KR (1998) Nonlinear component analysis as a Kernel eigenvalue problem. Neural Comput 10(5):1299\u20131319","journal-title":"Neural Comput"},{"issue":"10","key":"1332_CR19","doi-asserted-by":"crossref","first-page":"12036","DOI":"10.1016\/j.eswa.2009.03.036","volume":"36","author":"K Shafi","year":"2009","unstructured":"Shafi K, Abbass HA (2009) An adaptive genetic based signature learning system for intrusion detection. Expert Syst Appl 36(10):12036\u201312043","journal-title":"Expert Syst Appl"},{"key":"1332_CR20","unstructured":"Shon T, Kim Y, Lee C, Moon J (2005) A machine learning framework for network anomaly detection using SVM and GA. In: Proceedings of IWIAS05, pp 176\u2013183"},{"key":"1332_CR21","doi-asserted-by":"crossref","unstructured":"Srinoy S (2007) Intrusion detection model based on particle swarm optimization and support vector machine. In: Proceedings of CISDA07, pp 186\u2013192","DOI":"10.1109\/CISDA.2007.368152"},{"issue":"1","key":"1332_CR22","first-page":"1","volume":"12","author":"D Srivastava","year":"2010","unstructured":"Srivastava D, Bhambhu L (2010) Data classification using support vector machine. J Theor Appl Inf Technol 12(1):1\u20137","journal-title":"J Theor Appl Inf Technol"},{"key":"1332_CR23","unstructured":"Stolfo S J, Fan W, Prodromidis A, et al (1999) KDD Cup 1999 Data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html . Accessed 22 December 2011"},{"key":"1332_CR24","doi-asserted-by":"crossref","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36:11994\u201312000","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1332_CR25","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.patcog.2009.05.017","volume":"43","author":"CF Tsai","year":"2010","unstructured":"Tsai CF, Lin CY (2010) A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit 43(1):222\u2013229","journal-title":"Pattern Recognit"},{"key":"1332_CR26","unstructured":"Wang J, Hong X, Ren R, Li T (2009) A real-time intrusion detection system based on PSO-SVM. In: Proceedings of IWISA09, pp 319\u2013321"},{"key":"1332_CR27","doi-asserted-by":"crossref","unstructured":"Wang G, Hao JX, Ma J, Huang LH (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37:6225\u20136232","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"1332_CR28","doi-asserted-by":"crossref","unstructured":"Wang W, Battiti R (2006) Identifying intrusions in computer networks with principal component analysis. In: Proceedings of ARES06, pp 270\u2013279","DOI":"10.1109\/ARES.2006.73"},{"issue":"1","key":"1332_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu SX, Banzhaf W (2010) Use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1\u201335","journal-title":"Appl Soft Comput"},{"issue":"2","key":"1332_CR30","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.knosys.2010.09.003","volume":"24","author":"P Yang","year":"2011","unstructured":"Yang P, Zhu QS (2011) Finding key attribute subset in dataset for outlier detection. Knowl Based Syst 24(2):269\u2013274","journal-title":"Knowl Based Syst"},{"key":"1332_CR31","doi-asserted-by":"crossref","unstructured":"Zhang MH, Li G (2012) Network intrusion detection based on least squares support vector machine and chaos particle swarm optimization algorithm. J Converg Inf Technol 7(4):169\u2013173","DOI":"10.4156\/jcit.vol7.issue4.20"},{"issue":"12","key":"1332_CR32","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.1016\/j.comcom.2005.01.014","volume":"28","author":"Z Zhang","year":"2005","unstructured":"Zhang Z, Shen H (2005) Application of online-training SVMs for real-time intrusion detection with different considerations. Comput Commun 28(12):1428\u20131442","journal-title":"Comput Commun"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1332-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-014-1332-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1332-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T20:05:51Z","timestamp":1565553951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-014-1332-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,22]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["1332"],"URL":"https:\/\/doi.org\/10.1007\/s00500-014-1332-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,22]]}}}