{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:46:12Z","timestamp":1765356372718},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,5,5]],"date-time":"2018-05-05T00:00:00Z","timestamp":1525478400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11277-018-5662-0","type":"journal-article","created":{"date-parts":[[2018,5,5]],"date-time":"2018-05-05T04:46:18Z","timestamp":1525495578000},"page":"1689-1706","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers"],"prefix":"10.1007","volume":"100","author":[{"given":"Rania A.","family":"Ghazy","sequence":"first","affiliation":[]},{"given":"El-Sayed M.","family":"EL-Rabaie","sequence":"additional","affiliation":[]},{"given":"Moawad I.","family":"Dessouky","sequence":"additional","affiliation":[]},{"given":"Nawal A.","family":"El-Fishawy","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,5]]},"reference":[{"key":"5662_CR1","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/B978-0-12-801538-4.00004-5","volume-title":"Bio-inspired computation on telecommunication","author":"S Sen","year":"2015","unstructured":"Sen, S. (2015). Chapter 4: A survey of intrusion detection systems using evolutionary computation. In X. S. Yang, S. F. Chien, & T. O. Ting (Eds.), Bio-inspired computation on telecommunication (pp. 73\u201394). Burlington: Morgan Kaufmann."},{"key":"5662_CR2","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2009). A detailed analysis of the KDD CUP 99 data set. In: Second IEEE symposium on computational intelligence."},{"key":"5662_CR3","unstructured":"http:\/\/www.unb.ca\/cic\/datasets\/nsl.html\n                    \n                  . Accessed 11 April 2016."},{"issue":"4","key":"5662_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.5121\/ijcnc.2013.5412","volume":"5","author":"MF Elrawy","year":"2013","unstructured":"Elrawy, M. F., Abdelhamid, T. K., & Mohamed, A. M. (2013). IDS in telecommunication network using PCA. International Journal of Computer Networks & Communications (IJCNC), 5(4), 147\u2013157.","journal-title":"International Journal of Computer Networks & Communications (IJCNC)"},{"key":"5662_CR5","doi-asserted-by":"publisher","first-page":"259","DOI":"10.4236\/jis.2012.34033","volume":"3","author":"G Zargar","year":"2012","unstructured":"Zargar, G., & Baghaie, T. (2012). Category-based intrusion detection using PCA. Journal of Information Security, 3, 259\u2013271.","journal-title":"Journal of Information Security"},{"key":"5662_CR6","unstructured":"www.softcomputing.net\n                    \n                  . Accessed August 1, 2015."},{"key":"5662_CR7","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1016\/j.patcog.2008.10.028","volume":"42","author":"HW Liu","year":"2009","unstructured":"Liu, H. W., Suna, J. G., Liu, L., & Zhang, H. J. (2009). Feature selection with dynamic mutual information. Pattern Recognition, 42, 1330\u20131339.","journal-title":"Pattern Recognition"},{"key":"5662_CR8","unstructured":"Liu, H., Motoda, H., Setiono, R., & Zhao, Z. (2010). Feature selection: An eve evolving frontier in data mining. In: JMLR: Workshop and conference proceedings (Vol. 4, pp. 4\u201313). Publisher Citeseer."},{"key":"5662_CR9","unstructured":"Hall, M. (1999). Correlation based feature selection for machine learning. In: Doctoral dissertation, Department of Computer Science, University of Waikato."},{"key":"5662_CR10","first-page":"23","volume-title":"Threats countermeasures and advances in applied information security","author":"H Thanah","year":"2012","unstructured":"Thanah, H., Franke, K., & Pertovic, S. (2012). Chapter 2: Feature extraction methods for intrusion detection systems. In M. Gupta (Ed.), Threats countermeasures and advances in applied information security (pp. 23\u201352). IGI Global: Hershey."},{"key":"5662_CR11","unstructured":"Vege, S. H. (2010). Ensemble of feature selection techniques for high dimensional data. Published Master\u2019s thesis, Western Kentucky University."},{"key":"5662_CR12","unstructured":"Wang, Y., & Makedon, F. (2004). Application of relief feature filtering algorithm to selecting informative genes for cancer classification using microarray data. In: Computational systems bioinformatics conference, IEEE (pp. 497\u2013498)."},{"key":"5662_CR13","first-page":"1044","volume":"1","author":"B Neethu","year":"2013","unstructured":"Neethu, B. (2013). Classification of intrusion detection dataset using machine learning approaches. IJECSE, 1, 1044\u20131051.","journal-title":"IJECSE"},{"key":"5662_CR14","unstructured":"Garge, T., & Kumar, Y. (2014). Combinational feature selection approach for network intrusion detection system. In: International conference on parallel (pp. 82\u201387)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5662-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5662-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5662-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T10:22:53Z","timestamp":1557138173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5662-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,5]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5662"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5662-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,5]]},"assertion":[{"value":"5 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}