{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:47:00Z","timestamp":1768524420435,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09804-7","type":"journal-article","created":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T18:03:08Z","timestamp":1602871388000},"page":"6457-6478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["HFFPNN classifier: a hybrid approach for intrusion detection based OPSO and hybridization of feed forward neural network (FFNN) and probabilistic neural network (PNN)"],"prefix":"10.1007","volume":"80","author":[{"given":"T.","family":"Sree Kala","sequence":"first","affiliation":[]},{"given":"A.","family":"Christy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,16]]},"reference":[{"key":"9804_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad I, Abdullah AB, Algamdi AS (2009) Application of artificial neural network in detection of probing attacks. IEEE Symposium on Industrial Electronics and Applications (ISIEA 2009), October 4-6","DOI":"10.1109\/ISIEA.2009.5356382"},{"key":"9804_CR2","doi-asserted-by":"crossref","unstructured":"Aljawarneh S, Aldwairi M, Yassein MB (2017) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci","DOI":"10.1016\/j.jocs.2017.03.006"},{"key":"9804_CR3","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.energy.2012.10.035","volume":"49","author":"N An","year":"2013","unstructured":"An N, Zhao W, Wang J, Shang D, Zhao E (2013) Using multi-output feedforwardneural network with empirical mode decomposition based signal filtering forelectricity demand forecasting. Energy 49:279\u2013288","journal-title":"Energy"},{"key":"9804_CR4","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1016\/j.ins.2016.04.019","volume":"378","author":"RAR Ashfaq","year":"2017","unstructured":"Ashfaq RAR, Wang X-Z, Huang JZ, Abbas H, He Y-L (2017) Fuzziness based semi-supervised learning approach for intrusion detection system. Inf Sci 378:484\u2013497","journal-title":"Inf Sci"},{"issue":"1","key":"9804_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0925-2312(97)00063-5","volume":"19","author":"MR Berthold","year":"1998","unstructured":"Berthold MR, Diamond J (1998) Constructive training of probabilistic neural networks. Neurocomputing 19(1):167\u2013183","journal-title":"Neurocomputing"},{"key":"9804_CR6","doi-asserted-by":"crossref","unstructured":"Conti G, Abdullah K, Grizzard J, Stasko J, Copeland JA, Ahamad M, Owen HL, Lee C (2006) Countering security information overload through alert and packet visualization, Published by the IEEE Computer Society","DOI":"10.1109\/MCG.2006.30"},{"key":"9804_CR7","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal L, Shantharajah SP (2015) A Study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comp Commun Eng 4:446\u2013452","journal-title":"Int J Adv Res Comp Commun Eng"},{"key":"9804_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.procs.2015.09.145","volume":"61","author":"S Duquea","year":"2015","unstructured":"Duquea S, Omar MN b (2015) Using data mining algorithms for developing a model for Intrusion Detection System (IDS). Proced Comp Sci 61:46\u201351","journal-title":"Proced Comp Sci"},{"key":"9804_CR9","doi-asserted-by":"crossref","unstructured":"Gao YL, Jin Y, Chen Y, Wu J (2018) A novel semi-supervised learning approach for network intrusion detection on cloud-based robotic system, IEEE Access, 1\u201312","DOI":"10.1109\/ACCESS.2018.2868171"},{"key":"9804_CR10","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1016\/j.imavis.2008.03.004","volume":"26","author":"SS Ge","year":"2008","unstructured":"Ge SS, Yang Y, Lee TH (2008) Hand gesture recognition and tracking based on distributed locally linear embedding. Image Vis Comput 26:1607\u20131620","journal-title":"Image Vis Comput"},{"key":"9804_CR11","doi-asserted-by":"crossref","unstructured":"Heady R, Luger G, Maccabe A, Servilla (1990) The architecture of a network level intrusion detection system, Technical report, Computer Science Department, University of New Mexico","DOI":"10.2172\/425295"},{"key":"9804_CR12","doi-asserted-by":"crossref","unstructured":"Hooper E, Egham (2007) an intelligent intrusion detection and response system using hybrid ward hierarchical clustering analysis, IEEE International Conference on Multimedia and Ubiquitous Engineering","DOI":"10.1109\/MUE.2007.80"},{"key":"9804_CR13","unstructured":"Jiawei H, Micheline K (2006) Data Mining Concepts and techniques\u201d, second edition, China Machine Press, pp. 296\u2013303"},{"key":"9804_CR14","doi-asserted-by":"crossref","unstructured":"Jin H, Sun J, Chen H, Han Z (2004) A fuzzy data mining based intrusion detection model, Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems","DOI":"10.1109\/FTDCS.2004.1316613"},{"key":"9804_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.knosys.2017.06.022","volume":"132","author":"W Jun","year":"2017","unstructured":"Jun W, Lingyu T, Yuyan L, Peng G (2017) A weighted EMD-based prediction model based on TOPSIS and feed forward neural network for noised time series. Knowl-Based Syst 132:167\u2013178","journal-title":"Knowl-Based Syst"},{"key":"9804_CR16","doi-asserted-by":"crossref","unstructured":"Khatib EJ, BarcoR, G\u00f3mez-Andrades A (2015) Data mining for fuzzy diagnosis systems in LTE networks, Expert Systems with Applications","DOI":"10.1016\/j.eswa.2015.05.031"},{"key":"9804_CR17","doi-asserted-by":"crossref","unstructured":"Lei JZ, Ghorbani A (2004) Network intrusion detection using improved competitive learning neural network, Proc Second Ann Conf Commun Netw Serv Res","DOI":"10.1109\/DNSR.2004.1344728"},{"key":"9804_CR18","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1016\/j.procs.2010.12.198","volume":"3","author":"MN Mohammada","year":"2011","unstructured":"Mohammada MN, Sulaimana N, Muhsinb OA (2011) A novel intrusion detection system by using intelligent data Mining in Weka Environment. Proced Comp Sci 3:1237\u20131242","journal-title":"Proced Comp Sci"},{"key":"9804_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen HA, Choi D (2008) Application of data mining to network intrusion detection: classifier selection model, APNOMS 2008, LNCS 5297, Springer-Verlag Berlin Heidelberg 2008. pp.399\u2013408","DOI":"10.1007\/978-3-540-88623-5_41"},{"key":"9804_CR20","unstructured":"Olusola AA, Oladele AS, Abosede DO (2010) Analysis of KDD \u201899 Intrusion Detection Dataset for Selection of Relevance Features, Proceedings of the World Congress on Engineering and Computer Science Vol. I WCECS 2010. October 20-22, 2010, San Francisco, USA"},{"issue":"12","key":"9804_CR21","first-page":"1848","volume":"2","author":"DAMS Revathi","year":"2013","unstructured":"Revathi DAMS (2013) A Detailed Analysis on NSL-KDD Dataset Using Various Machine Learning Techniques for Intrusion Detection. Int J Eng Res Technol 2(12):1848\u20131853","journal-title":"Int J Eng Res Technol"},{"key":"9804_CR22","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.ijepes.2013.12.006","volume":"57","author":"PK Roy","year":"2014","unstructured":"Roy PK, Paul C, Sultana S (2014) Oppositional teaching learning based optimization approach for combined heat and power dispatch. Int J Electr Power Energy Syst 57:392\u2013403","journal-title":"Int J Electr Power Energy Syst"},{"key":"9804_CR23","doi-asserted-by":"crossref","unstructured":"Scarfone K, Mell (2007) Guide to Intrusion Detection and Prevention System, National Institute of Standards and Technology, Special Publication 800\u201394","DOI":"10.6028\/NIST.SP.800-94"},{"key":"9804_CR24","doi-asserted-by":"crossref","unstructured":"Sharma N, Mukherjee S (2012) Layered Approach for Intrusion Detection Using Na\u00efveBayes Classifier. ICACCI\u201912, August 3-5","DOI":"10.1145\/2345396.2345500"},{"key":"9804_CR25","doi-asserted-by":"crossref","unstructured":"Soon tee T, Ma K-L, Wu SF (2004) Detecting Flaws and Intruder with Visual Data Analysis, Published by the IEEE Computer Society, IEEE Computer Graphics and Applications","DOI":"10.1109\/MCG.2004.26"},{"key":"9804_CR26","unstructured":"Sree Kala T,\u00a0Christy A (2016) \u201cA pattern matching algorithm for reducing false positive in signature based intrusion detection system\u201d. Int J Eng Technol 8(2):580\u2013580"},{"key":"9804_CR27","unstructured":"Sree Kala T,\u00a0Christy A (2017)\u00a0\u201cA survey and analysis of machine learning algorithms for intrusion detection system\u201d. Journal of Advanced Research in Dynamical & Control Systems 04(Special Issue):40\u201346"},{"key":"9804_CR28","doi-asserted-by":"crossref","unstructured":"Sree Kala T,\u00a0Christy A (2019) \u201cAn intrusion detection system using opposition based particle swarm optimization algorithm and PNN\u201d. IEEE EXPLORE, pp 184\u201388","DOI":"10.1109\/COMITCon.2019.8862237"},{"key":"9804_CR29","unstructured":"Tiwari KK, Tiwari S, Yadav S (2011) Intrusion Detection Using Data Mining Techniques. Int J Adv Comp Technol (IJACT)"},{"key":"9804_CR30","doi-asserted-by":"crossref","unstructured":"Wang BX, Zhang DH, Wang J (2008) Application of Neural Network to Prediction of Plate Finish Cooling Temperature. J Centr South Univ Technol 15(1)","DOI":"10.1007\/s11771-008-0027-6"},{"key":"9804_CR31","volume-title":"Data mining practical machine learning tools and techniques","author":"IH Witten","year":"2005","unstructured":"Witten IH, Franck E (2005) Data mining practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco","edition":"2"},{"issue":"8","key":"9804_CR32","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1109\/TPAMI.2016.2537340","volume":"38","author":"D Wu","year":"2016","unstructured":"Wu D, Pigou L, Kindermans P-J, Le ND-H, Shao L, Dambre J, Odobez J-M (2016) Deep dynamic neural networks for multimodal gesture segmentation and recognition. IEEE Trans Pattern Anal Mach Intell 38(8):1583\u20131597","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"9804_CR33","first-page":"49","volume":"2","author":"X Xu","year":"2006","unstructured":"Xu X (2006) Adaptive Intrusion Detection Based on Machine Learning: feature Extraction, Classifier Construction and Sequential Pattern Prediction. Int J Web Serv Prac 2(1):49\u201358","journal-title":"Int J Web Serv Prac"},{"key":"9804_CR34","doi-asserted-by":"crossref","unstructured":"Youssef A, Emam A (2011) Network Intrusion Detection Using Data Mining AND Network Behaviour Analysis. Int J Comp Sci Info Technol (IJCSIT) 3(6)","DOI":"10.5121\/ijcsit.2011.3607"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09804-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09804-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09804-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T17:49:05Z","timestamp":1669225745000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09804-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,16]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9804"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09804-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,16]]},"assertion":[{"value":"3 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}