{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:20Z","timestamp":1761611480796},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:00:00Z","timestamp":1560988800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:00:00Z","timestamp":1560988800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11227-019-02899-2","type":"journal-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T09:02:30Z","timestamp":1561021350000},"page":"5521-5539","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Power information network intrusion detection based on data mining algorithm"],"prefix":"10.1007","volume":"76","author":[{"given":"Xiaojun","family":"Zuo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ze","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Limian","family":"Dong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jie","family":"Chang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Botao","family":"Hou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,6,20]]},"reference":[{"issue":"6\u20137","key":"2899_CR1","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.cose.2011.05.008","volume":"30","author":"JJ Davis","year":"2011","unstructured":"Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6\u20137):353\u2013375","journal-title":"Comput Secur"},{"issue":"1","key":"2899_CR2","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.ijleo.2015.10.078","volume":"127","author":"Y Li","year":"2016","unstructured":"Li Y, Yang L, Ding J (2016) A minimum enclosing ball-based support vector machine approach for detection of phishing websites. Optik Int J Light Electron Opt 127(1):345\u2013351","journal-title":"Optik Int J Light Electron Opt"},{"issue":"9","key":"2899_CR3","first-page":"2675","volume":"37","author":"W Yufei","year":"2013","unstructured":"Yufei W, Ting Z, Shaoyu LI, Baohua Z, Yujie LI (2013) An intrusion detection method for electric power information network based on improved minimum enclosing ball vector machine. Power Syst Technol 37(9):2675\u20132680","journal-title":"Power Syst Technol"},{"key":"2899_CR4","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.measurement.2014.04.034","volume":"55","author":"S Shamshirband","year":"2014","unstructured":"Shamshirband S, Amini A, Anuar NB, Mat Kiah ML, Teh YW, Furnell S (2014) D-ficca: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55:212\u2013226","journal-title":"Measurement"},{"issue":"1","key":"2899_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.eij.2013.10.003","volume":"15","author":"GV Nadiammai","year":"2014","unstructured":"Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37\u201350","journal-title":"Egypt Inform J"},{"issue":"128","key":"2899_CR6","first-page":"1","volume":"2016","author":"M Chen","year":"2016","unstructured":"Chen M, Liu Q (2016) Blow-up criteria of smooth solutions to a 3D model of electro-kinetic fluids in a bounded domain. Electron J Diff Equ 2016(128):1\u20138","journal-title":"Electron J Diff Equ"},{"issue":"2","key":"2899_CR7","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/s10255-018-0740-3","volume":"34","author":"Miaochao Chen","year":"2018","unstructured":"Chen Miaochao, Shengqi Lu, Liu Qilin (2018) Global regularity for a 2D model of electro-kinetic fluid in a bounded domain. Acta Math Appl Sin Engl Ser 34(2):398\u2013403","journal-title":"Acta Math Appl Sin Engl Ser"},{"issue":"4","key":"2899_CR8","first-page":"689","volume":"5","author":"I Kister","year":"2013","unstructured":"Kister I, Ge Y, Herbert J, Sinnecker T, Wuerfel J, Paul F (2013) Improved semi-supervised fuzzy clustering algorithm and application in effective intrusion detection system. Int J Adv Comput Technol 5(4):689\u2013696","journal-title":"Int J Adv Comput Technol"},{"issue":"9","key":"2899_CR9","doi-asserted-by":"publisher","first-page":"1574","DOI":"10.1002\/zamm.201700080","volume":"98","author":"Lu Shengqi","year":"2018","unstructured":"Shengqi Lu, Chen Miaochao, Liu Qilin (2018) On regularity for an Ericksen-Leslie\u2019s parabolic-hyperbolic liquid crystals model. Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik 98(9):1574\u20131584","journal-title":"Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik"},{"issue":"39","key":"2899_CR10","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.procs.2015.03.174","volume":"45","author":"U Ravale","year":"2015","unstructured":"Ravale U, Marathe N, Padiya P (2015) Feature selection based hybrid anomaly intrusion detection system using k means and rbf kernel function. Procedia Comput Sci 45(39):428\u2013435","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"2899_CR11","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1093\/comjnl\/bxu036","volume":"58","author":"G Han","year":"2015","unstructured":"Han G, Xun L, Jiang J et al (2015) Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks. Comput J 58(6):1280\u20131292","journal-title":"Comput J"},{"issue":"4","key":"2899_CR12","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.asej.2013.01.003","volume":"4","author":"RM Elbasiony","year":"2013","unstructured":"Elbasiony RM, Sallam EA, Eltobely TE et al (2013) A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng J 4(4):753\u2013762","journal-title":"Ain Shams Eng J"},{"issue":"1","key":"2899_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/JSYST.2013.2294120","volume":"9","author":"MA Faisal","year":"2015","unstructured":"Faisal MA, Aung Z, Williams JR, Sanchez A (2015) Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9(1):31\u201344","journal-title":"IEEE Syst J"},{"issue":"4","key":"2899_CR14","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/11574798_8","volume":"3700","author":"S Rawat","year":"2005","unstructured":"Rawat S, Gulati VP, Pujari AK (2005) A fast host-based intrusion detection system using rough set theory. Lect Notes Comput Sci 3700(4):144\u2013161","journal-title":"Lect Notes Comput Sci"},{"issue":"18","key":"2899_CR15","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.neucom.2013.04.038","volume":"121","author":"P Louvieris","year":"2013","unstructured":"Louvieris P, Clewley N, Liu X (2013) Effects-based feature identification for network intrusion detection. Neurocomputing 121(18):265\u2013273","journal-title":"Neurocomputing"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-02899-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-019-02899-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-019-02899-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T23:27:39Z","timestamp":1592522859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-019-02899-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,20]]},"references-count":15,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["2899"],"URL":"https:\/\/doi.org\/10.1007\/s11227-019-02899-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,20]]},"assertion":[{"value":"20 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}