{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:00:55Z","timestamp":1769310055903,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,10,6]],"date-time":"2017-10-06T00:00:00Z","timestamp":1507248000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University of Saudi Arabia","doi-asserted-by":"crossref","award":["HiCi"],"award-info":[{"award-number":["HiCi"]}],"id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s00500-017-2856-4","type":"journal-article","created":{"date-parts":[[2017,10,6]],"date-time":"2017-10-06T03:22:31Z","timestamp":1507260151000},"page":"1321-1336","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["A multi-objective evolutionary fuzzy system to obtain a broad and accurate set of solutions in intrusion detection systems"],"prefix":"10.1007","volume":"23","author":[{"given":"Salma","family":"Elhag","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6480-8434","authenticated-orcid":false,"given":"Alberto","family":"Fern\u00e1ndez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdulrahman","family":"Altalhi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saleh","family":"Alshomrani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francisco","family":"Herrera","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,10,6]]},"reference":[{"issue":"4","key":"2856_CR1","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TFUZZ.2006.889880","volume":"15","author":"R Alcala","year":"2007","unstructured":"Alcala R, Alcal\u00e1-Fdez J, Herrera F (2007) A proposal for the genetic lateral tuning of linguistic fuzzy systems and its interaction with rule selection. IEEE Trans Fuzzy Syst 15(4):616\u2013635","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"5","key":"2856_CR2","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1109\/TFUZZ.2011.2147794","volume":"19","author":"J Alcal\u00e1-Fdez","year":"2011","unstructured":"Alcal\u00e1-Fdez J, Alcal\u00e1 R, Herrera F (2011) A fuzzy association rule-based classification model for high-dimensional problems with genetic rule selection and lateral tuning. IEEE Trans Fuzzy Syst 19(5):857\u2013872","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"12","key":"2856_CR3","doi-asserted-by":"publisher","first-page":"4733","DOI":"10.1007\/s00500-015-1701-x","volume":"20","author":"AK Alok","year":"2016","unstructured":"Alok AK, Saha S, Ekbal A (2016) Multi-objective semi-supervised clustering for automatic pixel classification from remote sensing imagery. Soft Comput 20(12):4733\u20134751","journal-title":"Soft Comput"},{"issue":"4","key":"2856_CR4","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/s10489-012-0383-7","volume":"38","author":"S Benferhat","year":"2013","unstructured":"Benferhat S, Boudjelida A, Tabia K, Drias H (2013) An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge. Appl Intell 38(4):520\u2013540","journal-title":"Appl Intell"},{"issue":"9","key":"2856_CR5","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1007\/s00500-015-1942-8","volume":"21","author":"H Bostani","year":"2017","unstructured":"Bostani H, Sheikhan M (2017) Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems. Soft Comput 21(9):2307\u20132324","journal-title":"Soft Comput"},{"key":"2856_CR6","first-page":"722","volume-title":"PPSN, Lecture Notes in Computer Science","author":"J Branke","year":"2004","unstructured":"Branke J, Deb K, Dierolf H, Osswald M (2004) Finding knees in multi-objective optimization. In: Yao X, Burke EK, Lozano JA, Smith J, Guerv\u00f3s JJM, Bullinaria JA, Rowe JE, Ti\u00f1o P, Kab\u00e1n A, Schwefel HP (eds) PPSN, Lecture Notes in Computer Science, vol 3242. Springer, New York, pp 722\u2013731"},{"issue":"1","key":"2856_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TFUZZ.2004.839670","volume":"13","author":"J Casillas","year":"2005","unstructured":"Casillas J, Cord\u00f3n O, del Jes\u00fas MJ, Herrera F (2005) Genetic tuning of fuzzy rule deep structures preserving interpretability and its interaction with fuzzy rule set reduction. IEEE Trans Fuzzy Syst 13(1):13\u201329","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"4","key":"2856_CR8","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu S, Abraham A, Thomas JP (2005) Feature deduction and ensemble design of intrusion detection systems. Comput Secur 24(4):295\u2013307","journal-title":"Comput Secur"},{"issue":"9","key":"2856_CR9","doi-asserted-by":"publisher","first-page":"3014","DOI":"10.1016\/j.asoc.2012.04.020","volume":"12","author":"YY Chung","year":"2012","unstructured":"Chung YY, Wahid N (2012) A hybrid network intrusion detection system using simplified swarm optimization (SSO). Appl Soft Comput 12(9):3014\u20133022","journal-title":"Appl Soft Comput"},{"key":"2856_CR10","volume-title":"Evolutionary algorithms for solving multi-objective problems, genetic and evolutionary computation","author":"CA Coello-Coello","year":"2007","unstructured":"Coello-Coello CA, Lamont G, van Veldhuizen D (2007) Evolutionary algorithms for solving multi-objective problems, genetic and evolutionary computation, 2nd edn. Springer, Berlin","edition":"2"},{"issue":"1","key":"2856_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/S0888-613X(00)88942-2","volume":"20","author":"O Cord\u00f3n","year":"1999","unstructured":"Cord\u00f3n O, del Jesus MJ, Herrera F (1999) A proposal on reasoning methods in fuzzy rule-based classification systems. Int J Approx Reason 20(1):21\u201345","journal-title":"Int J Approx Reason"},{"issue":"2","key":"2856_CR12","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182\u2013197","journal-title":"IEEE Trans Evol Comput"},{"issue":"8","key":"2856_CR13","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/S1389-1286(98)00017-6","volume":"31","author":"H Debar","year":"1999","unstructured":"Debar H, Dacier M, Wespi A (1999) Towards a taxonomy of intrusion-detection systems. Comput Netw 31(8):805\u2013822","journal-title":"Comput Netw"},{"key":"2856_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05094-1","volume-title":"Introduction to evolutionary computation","author":"AE Eiben","year":"2003","unstructured":"Eiben AE, Smith JE (2003) Introduction to evolutionary computation. Springer, Berlin"},{"issue":"1","key":"2856_CR15","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.eswa.2014.08.002","volume":"42","author":"S Elhag","year":"2015","unstructured":"Elhag S, Fern\u00e1ndez A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42(1):193\u2013202","journal-title":"Expert Syst Appl"},{"issue":"23","key":"2856_CR16","doi-asserted-by":"publisher","first-page":"3064","DOI":"10.1016\/j.fss.2010.05.016","volume":"161","author":"A Fern\u00e1ndez","year":"2010","unstructured":"Fern\u00e1ndez A, Calder\u00f3n M, Barrenechea E, Bustince H, Herrera F (2010) Solving multi-class problems with linguistic fuzzy rule based classification systems based on pairwise learning and preference relations. Fuzzy Sets Syst 161(23):3064\u20133080","journal-title":"Fuzzy Sets Syst"},{"issue":"8","key":"2856_CR17","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1016\/j.ins.2009.12.014","volume":"180","author":"A Fern\u00e1ndez","year":"2010","unstructured":"Fern\u00e1ndez A, del Jesus MJ, Herrera F (2010) On the 2-tuples based genetic tuning performance for fuzzy rule based classification systems in imbalanced data-sets. Inf Sci 180(8):1268\u20131291","journal-title":"Inf Sci"},{"issue":"5","key":"2856_CR18","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1002\/widm.1134","volume":"4","author":"A Fernandez","year":"2014","unstructured":"Fernandez A, del Rio S, Lopez V, Bawakid A, del Jesus MJ, Benitez JM, Herrera F (2014) Big data with cloud computing: an insight on the computing environment, mapreduce and programming frameworks. Wiley Interdisc Rev Data Min Knowl Discov 4(5):380\u2013409","journal-title":"Wiley Interdisc Rev Data Min Knowl Discov"},{"key":"2856_CR19","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.knosys.2015.01.013","volume":"80","author":"A Fernandez","year":"2015","unstructured":"Fernandez A, Lopez V, del Jesus MJ, Herrera F (2015) Revisiting evolutionary fuzzy systems: taxonomy, applications, new trends and challenges. Knowl Based Syst 80:109\u2013121","journal-title":"Knowl Based Syst"},{"issue":"20","key":"2856_CR20","doi-asserted-by":"publisher","first-page":"4340","DOI":"10.1016\/j.ins.2011.02.021","volume":"181","author":"M Gacto","year":"2011","unstructured":"Gacto M, Alcal\u00e1 R, Herrera F (2011) Interpretability of linguistic fuzzy rule-based systems: an overview of interpretability measures. Inf Sci 181(20):4340\u20134360","journal-title":"Inf Sci"},{"issue":"8","key":"2856_CR21","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1016\/j.patcog.2011.01.017","volume":"44","author":"M Galar","year":"2011","unstructured":"Galar M, Fern\u00e1ndez A, Barrenechea E, Bustince H, Herrera F (2011) An overview of ensemble methods for binary classifiers in multi-class problems: experimental study on one-vs-one and one-vs-all schemes. Pattern Recogn 44(8):1761\u20131776","journal-title":"Pattern Recogn"},{"issue":"3","key":"2856_CR22","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1007\/s00500-014-1580-6","volume":"20","author":"I Goroohi Sardou","year":"2016","unstructured":"Goroohi Sardou I, Ameli MT (2016) A fuzzy-based non-dominated sorting genetic algorithm-II for joint energy and reserves market clearing. Soft Comput 20(3):1161\u20131177","journal-title":"Soft Comput"},{"key":"2856_CR23","doi-asserted-by":"crossref","unstructured":"Guo C, Zhou Y, Ping Y, Zhang Z, Liu G, Yang Y (2014) A distance sum-based hybrid method for intrusion detection. Appl Intell 40(1):178\u2013188","DOI":"10.1007\/s10489-013-0452-6"},{"issue":"6","key":"2856_CR24","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/91.890332","volume":"8","author":"F Herrera","year":"2000","unstructured":"Herrera F, Mart\u00ednez L (2000) A 2-tuple fuzzy linguistic representation model for computing with words. IEEE Trans Fuzzy Syst 8(6):746\u2013752","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"2856_CR25","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TFUZZ.2004.841738","volume":"13","author":"H Ishibuchi","year":"2005","unstructured":"Ishibuchi H, Yamamoto T (2005) Rule weight specification in fuzzy rule-based classification systems. IEEE Trans Fuzzy Syst 13:428\u2013435","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"2856_CR26","volume-title":"Classification and modeling with linguistic information granules: advanced approaches to linguistic data mining","author":"H Ishibuchi","year":"2004","unstructured":"Ishibuchi H, Nakashima T, Nii M (2004) Classification and modeling with linguistic information granules: advanced approaches to linguistic data mining. Springer, Berlin"},{"issue":"7","key":"2856_CR27","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1080\/08839510600779688","volume":"20","author":"B Kavsek","year":"2006","unstructured":"Kavsek B, Lavrac N (2006) Apriori-sd: Adapting association rule learning to subgroup discovery. Appl Artif Intell 20(7):543\u2013583","journal-title":"Appl Artif Intell"},{"issue":"2","key":"2856_CR28","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/s10489-010-0263-y","volume":"36","author":"KC Khor","year":"2012","unstructured":"Khor KC, Ting CY, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320\u2013329","journal-title":"Appl Intell"},{"issue":"7","key":"2856_CR29","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.1007\/s00500-015-1669-6","volume":"20","author":"P Kudlacik","year":"2016","unstructured":"Kudlacik P, Porwik P, Weso\u0142owski T (2016) Fuzzy approach for intrusion detection based on user\u2019s commands. Soft Comput 20(7):2705\u20132719","journal-title":"Soft Comput"},{"issue":"4","key":"2856_CR30","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W Lee","year":"2000","unstructured":"Lee W, Stolfo S (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Secur 3(4):227\u2013261","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"1","key":"2856_CR31","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TDSC.2014.2312327","volume":"12","author":"R Mitchell","year":"2015","unstructured":"Mitchell R, Chen I (2015) Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans Dependable Secure Comput 12(1):16\u201330","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"8","key":"2856_CR32","doi-asserted-by":"publisher","first-page":"3303","DOI":"10.1007\/s00500-015-1708-3","volume":"20","author":"A Mohammadi Shanghooshabad","year":"2016","unstructured":"Mohammadi Shanghooshabad A, Saniee Abadeh M (2016) Sifter: an approach for robust fuzzy rule set discovery. Soft Comput 20(8):3303\u20133319","journal-title":"Soft Comput"},{"issue":"6","key":"2856_CR33","doi-asserted-by":"publisher","first-page":"3104","DOI":"10.1109\/TSG.2015.2409775","volume":"6","author":"S Pan","year":"2015","unstructured":"Pan S, Morris T, Adhikari U (2015) Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans Smart Grid 6(6):3104\u20133113","journal-title":"IEEE Trans Smart Grid"},{"key":"2856_CR34","doi-asserted-by":"crossref","unstructured":"Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448\u20133470","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"2856_CR35","unstructured":"Perona I, Gurrutxaga I, Arbelaitz O, Mart\u00edn JI, Muguerza J, P\u00e9rez JM (2008) Service-independent payload analysis to improve intrusion detection in network traffic. In: Proceedings of the 7th Australasian Data Mining Conference (AusDM08), pp 171\u2013178"},{"key":"2856_CR36","volume-title":"C4.5: programs for machine learning","author":"J Quinlan","year":"1993","unstructured":"Quinlan J (1993) C4.5: programs for machine learning. Morgan Kauffman, San Mateo"},{"key":"2856_CR37","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani A (2009) A detailed analysis of the KDD cup 99 data set. In: Second IEEE symposium on computational intelligence for security and defense applications (CISDA09), pp 53\u201358","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"4","key":"2856_CR38","doi-asserted-by":"publisher","first-page":"55:1","DOI":"10.1145\/2716260","volume":"47","author":"E Vasilomanolakis","year":"2015","unstructured":"Vasilomanolakis E, Karuppayah S, Muhlhauser M (2015) Taxonomy and survey of collaborative intrusion detection. ACM Comput Surv 47(4):55:1\u201355:33","journal-title":"ACM Comput Surv"},{"issue":"1","key":"2856_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: a review. Appl Soft Comput 10(1):1\u201335","journal-title":"Appl Soft Comput"},{"key":"2856_CR40","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-46027-6","volume-title":"Association rule mining, models and algorithms, Lecture Notes in Computer Science","author":"C Zhang","year":"2002","unstructured":"Zhang C, Zhang S (2002) Association rule mining, models and algorithms, Lecture Notes in Computer Science, vol 2307. Springer, Berlin"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2856-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2856-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2856-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T01:27:11Z","timestamp":1659576431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2856-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,6]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["2856"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2856-4","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,6]]},"assertion":[{"value":"6 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"None","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}