{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T07:56:39Z","timestamp":1773388599267,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"nsfc","doi-asserted-by":"crossref","award":["61572184"],"award-info":[{"award-number":["61572184"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10489-017-1085-y","type":"journal-article","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:58:16Z","timestamp":1510016296000},"page":"2315-2327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":79,"title":["A new evolutionary neural networks based on intrusion detection systems using multiverse optimization"],"prefix":"10.1007","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8358-8759","authenticated-orcid":false,"given":"Ilyas","family":"Benmessahel","sequence":"first","affiliation":[]},{"given":"Kun","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Mouna","family":"Chellal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"issue":"C","key":"1085_CR1","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed M, Mahmood AN, Hu J (2016) A survey of network anomaly detection techniques. J Netw Comput Appl 60(C): 19\u201331","journal-title":"J Netw Comput Appl"},{"key":"1085_CR2","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.seta.2016.08.004","volume":"17","author":"EE Ali","year":"2016","unstructured":"Ali EE, El-Hameed MA, El-Fergany AA, El-Arini MM (2016) Parameter extraction of photovoltaic generating units using multi-verse optimizer. Sustainable Energy Technol Assess 17:68\u201376","journal-title":"Sustainable Energy Technol Assess"},{"key":"1085_CR3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.procs.2015.07.040","volume":"55","author":"SMH Bamakan","year":"2015","unstructured":"Bamakan SMH, Amiri B, Mirzabagheri M, Shi Y (2015) A new intrusion detection approach using pso based multiple criteria linear programming. Procedia Comput Sci 55:231\u2013237","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"1085_CR4","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s10462-011-9270-6","volume":"39","author":"S Ding","year":"2013","unstructured":"Ding S, Li H, Su C, Yu J, Jin F (2013) Evolutionary artificial neural networks: a review. Artif Intell Rev 39(3):251\u2013260","journal-title":"Artif Intell Rev"},{"key":"1085_CR5","doi-asserted-by":"crossref","unstructured":"Enache AC, Patriciu VV (2014) Intrusions detection based on support vector machine optimized with swarm intelligence. In: 2014 IEEE 9th IEEE international symposium on applied computational intelligence and informatics (SACI), pp 153\u2013158","DOI":"10.1109\/SACI.2014.6840052"},{"key":"1085_CR6","doi-asserted-by":"crossref","unstructured":"Gonzalez F, Gomez J, Kaniganti M, Dasgupta D (2003) An evolutionary approach to generate fuzzy anomaly (attack) signatures. In: IEEE systems man and cybernetics society information assurance workshop, 2003, pp 251\u2013259","DOI":"10.1109\/SMCSIA.2003.1232430"},{"issue":"3","key":"1085_CR7","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSMCB.2005.860136","volume":"36","author":"S-J Han","year":"2005","unstructured":"Han S-J, Cho S-B (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern B Cybern 36(3):559\u2013570","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"1085_CR8","doi-asserted-by":"crossref","unstructured":"Hofmann A, Sick B (2003) Evolutionary optimization of radial basis function networks for intrusion detection. In: Proceedings of the international joint conference on neural networks, 2003., vol 1, vol 1, pp 415\u2013420","DOI":"10.1109\/IJCNN.2003.1223382"},{"issue":"6","key":"1085_CR9","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W Lee","year":"2000","unstructured":"Lee W, Stolfo SJ, Mok KW (2000) Adaptive intrusion detection: A data mining approach. Artif Intell Rev 14(6):533\u2013567","journal-title":"Artif Intell Rev"},{"key":"1085_CR10","unstructured":"Li J, Zhang G-Y, Gu G-C (2004) The research and implementation of intelligent intrusion detection system based on artificial neural network. In: Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826), vol 5, pp 3178\u20133182"},{"key":"1085_CR11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","volume":"78","author":"W-C Lin","year":"2015","unstructured":"Lin W-C, Ke S-W, Tsai C-F (2015) Cann: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowl-Based Syst 78:13\u201321","journal-title":"Knowl-Based Syst"},{"key":"1085_CR12","doi-asserted-by":"crossref","unstructured":"Michailidis E, Katsikas SK, Georgopoulos E (2008) Intrusion detection using evolutionary neural networks. In: 2008 Panhellenic Conference on Informatics, pp 8\u201312","DOI":"10.1109\/PCI.2008.53"},{"issue":"2","key":"1085_CR13","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/s00521-015-1870-7","volume":"27","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Mirjalili SM, Hatamlou A (2016) Multi-verse optimizer: a nature-inspired algorithm for global optimization. Neural Comput Applic 27(2):495\u2013513","journal-title":"Neural Comput Applic"},{"key":"1085_CR14","unstructured":"Moradi M, Zulkernine M (2004) A neural network based system for intrusion detection and classification of attacks. In: Proceedings of the IEEE international conference on advances in intelligent systems, pp 15\u201318"},{"key":"1085_CR15","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"1085_CR16","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (2015) The significant features of the unsw-nb15 and the kdd99 data sets for network intrusion detection systems. In: 2015 4th international workshop on building analysis datasets and gathering experience returns for security (BADGERS), pp 25\u201331. IEEE","DOI":"10.1109\/BADGERS.2015.014"},{"issue":"1-3","key":"1085_CR17","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: Statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf Secur J A Global Perspect 25(1-3):18\u201331","journal-title":"Inf Secur J A Global Perspect"},{"key":"1085_CR18","unstructured":"NSLKDD (2013) Nsl-kdd dataset, retrieved from http:\/\/nsl.cs.unb.ca\/NSL-KDD"},{"key":"1085_CR19","unstructured":"Rastegari S (2015) Intelligent network intrusion detection using an evolutionary computation approach"},{"key":"1085_CR20","unstructured":"Ryan J, Lin M-J, Miikkulainen R (1998) Intrusion detection with neural networks. In: Jordan MI, Kearns MJ, Solla SA (eds) Advances in Neural Information Processing Systems 10, pages 943\u2013949. MIT Press"},{"key":"1085_CR21","unstructured":"Sammany M, Sharawi M, El-Beltagy M, Saroit I (2007) Artificial neural networks architecture for intrusion detection systems and classification of attacks. In: The 5th international conference INFO2007, pp 24\u201326"},{"key":"1085_CR22","first-page":"028","volume":"1","author":"LI Shuhui","year":"2010","unstructured":"Shuhui LI (2010) Improved evolutionary neural network algorithm and its applications in intrusion detection. Mod Electron Technique 1:028","journal-title":"Mod Electron Technique"},{"key":"1085_CR23","doi-asserted-by":"crossref","unstructured":"Tavallaee M, Bagheri E, Lu W, Ghorbani AA (2009) A detailed analysis of the kdd cup 99 data set. In: Proceedings of the 2nd IEEE international conference on computational intelligence for security and defense applications, CISDA\u201909, pp 53\u201358, Piscataway, NJ, USA. IEEE Press","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"1085_CR24","unstructured":"the Cyber Range Lab of the Australian Centre for Cyber Security (ACCS) (2015) Unsw-nb15 dataset, retrieved from http:\/\/www.accs.unsw.adfa.edu.au\/"},{"key":"1085_CR25","unstructured":"Wang L, Yu G, Wang G, Wang D (2001) Method of evolutionary neural network-based intrusion detection. In: 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479), vol 5, pp 13\u201318"},{"key":"1085_CR26","doi-asserted-by":"crossref","unstructured":"Witten IH, Frank E, Hall MA (2011). In: Witten IH, Frank E, Hall MA (eds) Data Mining: Practical Machine Learning Tools and Techniques (3rd Edition), The Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, Boston, third edition","DOI":"10.1016\/B978-0-12-374856-0.00001-8"},{"issue":"1","key":"1085_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection systems: A review. Appl Soft Comput 10(1):1\u201335","journal-title":"Appl Soft Comput"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-017-1085-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-1085-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-1085-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T14:37:00Z","timestamp":1570286220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-017-1085-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["1085"],"URL":"https:\/\/doi.org\/10.1007\/s10489-017-1085-y","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,7]]}}}