{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T07:10:36Z","timestamp":1765177836093,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T00:00:00Z","timestamp":1509408000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Parallel Prog"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10766-017-0537-7","type":"journal-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T08:31:56Z","timestamp":1509438716000},"page":"740-758","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining"],"prefix":"10.1007","volume":"47","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1391-7363","authenticated-orcid":false,"given":"Haipeng","family":"Yao","sequence":"first","affiliation":[]},{"given":"Qiyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Luyao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peiying","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Maozhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yunjie","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"537_CR1","doi-asserted-by":"crossref","unstructured":"Alriyami, Q.M., Asimakopoulou, E., Bessis, N.: A survey of intrusion detection systems for mobile ad hoc networks. In: International Conference on Intelligent Networking and Collaborative Systems(INCoS), Salerno, Italy, pp. 427\u2013432 (2014)","DOI":"10.1109\/INCoS.2014.27"},{"key":"537_CR2","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An intrusion-detection model. In: IEEE Symposium on Security and Privacy, CA, USA, Oakland , pp. 222\u2013232 (1986)","DOI":"10.1109\/SP.1986.10010"},{"issue":"3","key":"537_CR3","first-page":"273","volume":"20","author":"V Vapnik","year":"1995","unstructured":"Vapnik, V., Cortes, C.: Support vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"1","key":"537_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S0169-2070(97)00044-7","volume":"14","author":"G Zhang","year":"1998","unstructured":"Zhang, G., Patuwo, B.E., Hu, M.Y.: Forecasting with artificial neural networks: the state of the art. Int. J. Forecast. 14(1), 35\u201362 (1998)","journal-title":"Int. J. Forecast."},{"issue":"1","key":"537_CR5","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"issue":"1","key":"537_CR6","first-page":"157","volume":"45","author":"A Cutler","year":"2004","unstructured":"Cutler, A., Cutler, D.R., Stevens, J.R.: Random forests. Mach. Learn. 45(1), 157\u2013176 (2004)","journal-title":"Mach. Learn."},{"issue":"3","key":"537_CR7","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Comput. Surv. 31(3), 264\u2013323 (1999)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"537_CR8","doi-asserted-by":"publisher","first-page":"100","DOI":"10.2307\/2346830","volume":"28","author":"JA Hartigan","year":"1979","unstructured":"Hartigan, J.A., Wong, M.A.: A K-means clustering algorithm. Appl. Stat. 28(1), 100\u2013108 (1979)","journal-title":"Appl. Stat."},{"key":"537_CR9","doi-asserted-by":"crossref","unstructured":"Khan K., Rehman, S.U., Aziz, K., Fong, S., Sarasvady, S.: DBSCAN: past, present and future. In: Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), Bangalore, India, pp. 232\u2013238 (2014)","DOI":"10.1109\/ICADIWT.2014.6814687"},{"issue":"12","key":"537_CR10","first-page":"1242","volume":"33","author":"K Wang","year":"2007","unstructured":"Wang, K., Zhang, J., Li, D., Zhang, X., Guo, T.: Adaptive affinity propagation clustering. Acta Automatica Sinica 33(12), 1242\u20131246 (2007)","journal-title":"Acta Automatica Sinica"},{"issue":"9","key":"537_CR11","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"537_CR12","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxt044","volume":"57","author":"P Gogoi","year":"2014","unstructured":"Gogoi, P., Bhattacharyya, D.K., Borah, B., Kalita, J.K.: MLH-IDS: a multi-level hybrid intrusion detection method. Comput. J. 57(4), 602\u2013623 (2014)","journal-title":"Comput. J."},{"key":"537_CR13","unstructured":"KDD Cup 1999 Data. [Online]. \n                    http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"issue":"6","key":"537_CR14","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. J. Mach. Learn. Res. 3(6), 1157\u20131182 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"537_CR15","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Syst. Appl. 67, 296\u2013303 (2017)","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"537_CR16","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"M Ambusaidi","year":"2016","unstructured":"Ambusaidi, M., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986\u20132998 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"537_CR17","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.eswa.2010.06.066","volume":"38","author":"SJ Horng","year":"2011","unstructured":"Horng, S.J., Su, M.Y., Chen, Y.H., Kao, T.W., Chen, R.J., Lai, J.L., Perkasa, C.D.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl. 38(1), 306\u2013313 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"537_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/846183.846199","volume":"1","author":"C Elkan","year":"2000","unstructured":"Elkan, C.: Results of the KDD\u201999 classifier learning. ACM SIGKDD Explor. Newslett. 1(2), 63\u201364 (2000)","journal-title":"ACM SIGKDD Explor. Newslett."}],"container-title":["International Journal of Parallel Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-017-0537-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10766-017-0537-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10766-017-0537-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T05:07:18Z","timestamp":1563599238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10766-017-0537-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,31]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["537"],"URL":"https:\/\/doi.org\/10.1007\/s10766-017-0537-7","relation":{},"ISSN":["0885-7458","1573-7640"],"issn-type":[{"type":"print","value":"0885-7458"},{"type":"electronic","value":"1573-7640"}],"subject":[],"published":{"date-parts":[[2017,10,31]]},"assertion":[{"value":"11 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}