{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T10:57:53Z","timestamp":1763809073327},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,9,23]],"date-time":"2011-09-23T00:00:00Z","timestamp":1316736000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s11227-011-0698-x","type":"journal-article","created":{"date-parts":[[2011,9,22]],"date-time":"2011-09-22T13:28:08Z","timestamp":1316698088000},"page":"522-526","source":"Crossref","is-referenced-by-count":6,"title":["Dynamic learning model update of hybrid-classifiers for intrusion detection"],"prefix":"10.1007","volume":"64","author":[{"given":"Jaeik","family":"Cho","sequence":"first","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]},{"given":"Ken","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jongsub","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,23]]},"reference":[{"key":"698_CR1","volume-title":"17th ACM conference on computer and communication security","author":"T Limmer","year":"2010","unstructured":"Limmer T, Dressler F (2010) Dialog-based payload aggregation for intrusion detection. In: 17th ACM conference on computer and communication security"},{"issue":"1","key":"698_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","volume":"10","author":"SX Wu","year":"2010","unstructured":"Wu SX, Banzhaf W (2010) The use of computational intelligence in intrusion detection system: A\u00a0review. Appl Soft Comput 10(1):1\u201335","journal-title":"Appl Soft Comput"},{"key":"698_CR3","volume-title":"2010, 2011 CSI\/FBI computer crime and security survey","author":"Computer Security Institute","year":"2010","unstructured":"Computer Security Institute (2010) In: 2010, 2011 CSI\/FBI computer crime and security survey"},{"key":"698_CR4","first-page":"360","volume-title":"LNCS","author":"AJ Oliner","year":"2010","unstructured":"Oliner AJ, Kulkarni AV, Aiken A (2010) Community epidemic detection using time-correlated anomalies. In: LNCS, vol\u00a06307. Springer, Berlin, pp 360\u2013381"},{"key":"698_CR5","unstructured":"Govindarajan M, Chandrasenkaran RM (2010) Intrusion detection using neural based hybrid classification methods. Comput Netw"},{"key":"698_CR6","first-page":"269","volume-title":"LNCS","author":"A Abraham","year":"2001","unstructured":"Abraham A (2001) Neuro-fuzzy systems: state-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence. In: LNCS, vol 2084. Springer, Berlin, pp 269\u2013276"},{"key":"698_CR7","first-page":"105","volume":"24","author":"K Ali","year":"1996","unstructured":"Ali K, Pazzani M (1996) Error reduction through learning multiple descriptions. Mach Learn 24:105\u2013112","journal-title":"Mach Learn"},{"key":"698_CR8","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-540-24623-7_8","volume-title":"Agent-based hybrid intelligent systems","author":"Z Zhang","year":"2004","unstructured":"Zhang Z, Zhang C (2004) Agent-based hybrid intelligent systems. Springer, Berlin, pp 127\u2013142"},{"key":"698_CR9","doi-asserted-by":"crossref","unstructured":"Greenacre M (2010) Correspondence analysis of raw data. Ecol Soc Am 91(4)","DOI":"10.1890\/09-0239.1"},{"key":"698_CR10","doi-asserted-by":"crossref","unstructured":"Yen L, Saerens M, Fouss F (2011) A link analysis extension of correspondence analysis for mining relation databases. IEEE Computer Society 23(4)","DOI":"10.1109\/TKDE.2010.142"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0698-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0698-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0698-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T02:09:42Z","timestamp":1560650982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0698-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,23]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["698"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0698-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9,23]]}}}