{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T13:29:49Z","timestamp":1744896589196,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2015,11,28]],"date-time":"2015-11-28T00:00:00Z","timestamp":1448668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61373134"],"award-info":[{"award-number":["No.61373134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Priority Academic Program Development of Jiangsu Higer Education Institutions(PAPD)","award":["No.KDXS1105"],"award-info":[{"award-number":["No.KDXS1105"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11042-015-3117-0","type":"journal-article","created":{"date-parts":[[2015,11,28]],"date-time":"2015-11-28T06:30:52Z","timestamp":1448692252000},"page":"19397-19410","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Towards accurate intrusion detection based on improved clonal selection algorithm"],"prefix":"10.1007","volume":"76","author":[{"given":"Chunyong","family":"Yin","sequence":"first","affiliation":[]},{"given":"Luyu","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"key":"3117_CR1","unstructured":"Aickelin U, Bentley P, Cayzer S, Kim J, McLeod J (2003) Danger theory: The link between AIS and IDS? In: Timmis J, Bentley PJ, Hart E (eds) Artificial immune systems. Second International Conference, ICARIS 2003, Edinburgh, UK, September 1\u20133, 2003. Lecture Notes in Computer Science, vol 2787. Springer, Berlin, Heidelberg, pp 147\u2013155"},{"key":"3117_CR2","doi-asserted-by":"crossref","unstructured":"Aickelin U, Dasgupta D, Gu F (2014) Artificial immune systems. In: Burke EK, Kendall G (eds) Search methodologies. Introductory Tutorials in Optimization and Decision Support Techniques. Springer, US, pp 187\u2013211","DOI":"10.1007\/978-1-4614-6940-7_7"},{"key":"3117_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-59901-9","volume-title":"An overview of artificial immune systems and their applications","author":"D. DasGupta","year":"1999","unstructured":"DasGupta D (1999) An overview of artificial immune systems and their applications. Springer, New York"},{"key":"3117_CR4","doi-asserted-by":"crossref","unstructured":"Forrest S, Hofmeyr S, Somayaji A, Longstaff T (1996) A sense of self for unix processes. Proceedings of the IEEE Symposium on Security & Privacy 11(30):120\u2013128","DOI":"10.1109\/SECPRI.1996.502675"},{"issue":"7","key":"3117_CR5","first-page":"1641","volume":"7","author":"Y Gu","year":"2012","unstructured":"Gu Y, Shi Y, Wang J (2012) Efficient intrusion detection based on multiple neural network classifiers with improved genetic algorithm. J Softw 7(7):1641\u20131648","journal-title":"J Softw"},{"key":"3117_CR6","doi-asserted-by":"crossref","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2014) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403-1416","DOI":"10.1109\/TNNLS.2014.2342533"},{"key":"3117_CR7","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015) Incremental learning for \u03bd-Support Vector Regression. Neural Netw 67:140\u2013150","journal-title":"Neural Netw"},{"key":"3117_CR8","unstructured":"Kim J, Bentley PJ (2001) Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator. IEEE 1244\u20131252"},{"key":"3117_CR9","unstructured":"Kim J, Bentley PJ (2002) Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. IEEE 1015\u20131020"},{"issue":"1","key":"3117_CR10","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K (2012) An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1):424\u2013430","journal-title":"Expert Syst Appl"},{"issue":"1","key":"3117_CR11","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","volume":"36","author":"H-J Liao","year":"2013","unstructured":"Liao H-J, Lin C-HR, Lin Y-C, Tung K-Y (2013) Intrusion detection system: A comprehensive review. J Netw Comput Appl 36(1):16\u201324","journal-title":"J Netw Comput Appl"},{"key":"3117_CR12","doi-asserted-by":"crossref","unstructured":"McClelland JL, Rumelhart DE, Group PR (1986) Parallel distributed processing. Explorations in the microstructure of cognition, vol 1. MIT Press, Cambridge","DOI":"10.7551\/mitpress\/5236.001.0001"},{"issue":"4","key":"3117_CR13","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J. McHugh","year":"2000","unstructured":"McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst Secur 3(4):262\u2013294","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"7","key":"3117_CR14","first-page":"78","volume":"88","author":"C-M Ou","year":"2012","unstructured":"Ou C-M (2012) Host-based intrusion detection systems adapted from agent-based artificial immune systems. Neurocomputing 88(7):78\u201386","journal-title":"Neurocomputing"},{"issue":"7","key":"3117_CR15","first-page":"19","volume":"25","author":"S-h Qing","year":"2004","unstructured":"Qing S-h, J-c J, Ma H-t, W-p W, X-f L (2004) Research on intrusion detection techniques: a survey. Journal-China Institute of Communications 25(7):19\u201329","journal-title":"Journal-China Institute of Communications"},{"key":"3117_CR16","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J. Schmidhuber","year":"2015","unstructured":"Schmidhuber J (2015) Deep learning in neural networks: An overview. Neural Netw 61:85\u2013117","journal-title":"Neural Netw"},{"issue":"2","key":"3117_CR17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10462-011-9206-1","volume":"36","author":"BH Ulutas","year":"2011","unstructured":"Ulutas BH, Kulturel-Konak S (2011) A review of clonal selection algorithm and its applications. Artif Intell Rev 36(2):117\u2013138","journal-title":"Artif Intell Rev"},{"key":"3117_CR18","first-page":"425491","volume":"2014","author":"C. Yin","year":"2014","unstructured":"Yin C (2014) Towards Accurate Node-Based Detection of P2P Botnets. Sci World J 2014:425491","journal-title":"Sci World J"},{"issue":"6","key":"3117_CR19","doi-asserted-by":"crossref","first-page":"291","DOI":"10.14257\/ijhit.2013.6.6.26","volume":"6","author":"C Yin","year":"2013","unstructured":"Yin C, Zou M, Iko D, Wang J (2013) Botnet detection based on correlation of malicious behaviors. International Journal of Hybrid Information Technology 6(6):291\u2013300","journal-title":"International Journal of Hybrid Information Technology"},{"key":"3117_CR20","doi-asserted-by":"crossref","unstructured":"Zhang F, Wang D (2013) An effective feature selection approach for network intrusion detection. IEEE 307\u2013311","DOI":"10.1109\/NAS.2013.49"},{"issue":"9","key":"3117_CR21","first-page":"256","volume":"5","author":"B Zhang","year":"2013","unstructured":"Zhang B, Zhang S, Lu G (2013) Evaluation model research of 100 meters sprint exercise capacity based on fuzzy neural network. J Chem Pharm Res 5(9):256","journal-title":"J Chem Pharm Res"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3117-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3117-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3117-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3117-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T00:50:18Z","timestamp":1599871818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3117-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,28]]},"references-count":21,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["3117"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3117-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2015,11,28]]}}}