{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:58Z","timestamp":1763499298906},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T00:00:00Z","timestamp":1464825600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Life Robotics"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10015-016-0281-x","type":"journal-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T09:47:09Z","timestamp":1464860829000},"page":"371-377","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A random-forests-based classifier using class association rules and its application to an intrusion detection system"],"prefix":"10.1007","volume":"21","author":[{"given":"Shingo","family":"Mabu","sequence":"first","affiliation":[]},{"given":"Shun","family":"Gotoh","sequence":"additional","affiliation":[]},{"given":"Masanao","family":"Obayashi","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Kuremoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"281_CR1","unstructured":"Lee W, Stolfo SJ (1998) Data mining approaches for intrusion detection. In: Proc. of the 1998 USENIX Security Symp"},{"key":"281_CR2","volume-title":"Pattern recognition and machine learning","author":"CM Bishop","year":"2006","unstructured":"Bishop CM (2006) Pattern recognition and machine learning. Springer, New York"},{"key":"281_CR3","volume-title":"C4.5: programs for machine learning","author":"RJ Quinlan","year":"1993","unstructured":"Quinlan RJ (1993) C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc, Burlington"},{"key":"281_CR4","unstructured":"Katagiri H, Hirasawa K, Hu J, Murata J (2001) Network structure oriented evolutionary model\u2014genetic network programming. In: Proc. of genetic and evolutionary computation conference, pp 219\u2013226"},{"key":"281_CR5","volume-title":"Adaptation in natural and artificial systems","author":"JH Holland","year":"1975","unstructured":"Holland JH (1975) Adaptation in natural and artificial systems. University of Michigan Press, Ann Arbor"},{"key":"281_CR6","volume-title":"Genetic programming: on the programming of computers by means of natural selection","author":"JR Koza","year":"1992","unstructured":"Koza JR (1992) Genetic programming: on the programming of computers by means of natural selection. MIT Press, Cambridge"},{"issue":"1","key":"281_CR7","doi-asserted-by":"crossref","first-page":"102","DOI":"10.20965\/jaciii.2006.p0102","volume":"10","author":"K Shimada","year":"2006","unstructured":"Shimada K, Hirasawa K, Hu J (2006) Genetic network programming with acquisition mechanisms of association rules. J Adv Comput Intell Intell Inform 10(1):102\u2013111","journal-title":"J Adv Comput Intell Intell Inform"},{"issue":"1","key":"281_CR8","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/TSMCC.2010.2050685","volume":"41","author":"S Mabu","year":"2010","unstructured":"Mabu S, Chen C, Lu N, Shimada K, Hirasawa K (2010) An intrusion detection model based on fuzzy class association rule mining using genetic network programming. IEEE Trans Syst Man Cybern Part C Appl Rev 41(1):130\u2013139","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"issue":"7","key":"281_CR9","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1541\/ieejeiss.126.849","volume":"126","author":"K Shimada","year":"2006","unstructured":"Shimada K, Wang R, Hirasawa K, Furuzuki T (2006) Medical association rule mining using genetic network programming. IEEJ Trans EIS 126(7):849\u2013856","journal-title":"IEEJ Trans EIS"},{"key":"281_CR10","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the KDD CUP 99 data set. In: IEEE symposium on computational intelligence for security and defense applications, CISDA, Cisda, pp 1\u20136","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"281_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-46027-6","volume-title":"Association rule mining: models and algorithm","author":"C Zhang","year":"2002","unstructured":"Zhang C, Zhang S (2002) Association rule mining: models and algorithm. Springer, Berlin"},{"key":"281_CR12","unstructured":"Agrawal R, Srikant R (1994) Fast algorithms for mining association rules. In: Proc. of the 20th VLDB Conf., Santiago, Chile, pp 487\u2013499"},{"issue":"1","key":"281_CR13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"issue":"5","key":"281_CR14","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","volume":"38","author":"J Zhang","year":"2008","unstructured":"Zhang J, Zulkernine M, Haque A (2008) Random-forests-based network intrusion detection systems. IEEE Trans Syst Man Cybern Part C Appl Rev 38(5):649\u2013659","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"281_CR15","unstructured":"KDDCup1999 Data. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html . Accessed 22 Dec 2015"},{"key":"281_CR16","unstructured":"Waikato environment for knowledge analysis (Weka), open source project for machine learning. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/ . Accessed 22 Dec 2015"}],"container-title":["Artificial Life and Robotics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10015-016-0281-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10015-016-0281-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10015-016-0281-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:33:58Z","timestamp":1498318438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10015-016-0281-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,2]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["281"],"URL":"https:\/\/doi.org\/10.1007\/s10015-016-0281-x","relation":{},"ISSN":["1433-5298","1614-7456"],"issn-type":[{"value":"1433-5298","type":"print"},{"value":"1614-7456","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,2]]}}}