{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:20Z","timestamp":1772119880306,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T00:00:00Z","timestamp":1638403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T00:00:00Z","timestamp":1638403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11277-021-09393-0","type":"journal-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T15:53:51Z","timestamp":1638460431000},"page":"1033-1059","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Diverse Analysis of Data Mining and Machine Learning Algorithms to Secure Computer Network"],"prefix":"10.1007","volume":"124","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8922-4059","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Upendra","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,2]]},"reference":[{"key":"9393_CR1","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1016\/j.pisc.2016.05.010","volume":"8","author":"K Keerthi Vasan","year":"2016","unstructured":"Keerthi Vasan, K., & Surendiran, B. (2016). Dimensionality reduction using principal component analysis for network intrusion detection. Perspectives on Science, 8, 510\u2013512. https:\/\/doi.org\/10.1016\/j.pisc.2016.05.010","journal-title":"Perspectives on Science"},{"issue":"5","key":"9393_CR2","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1007\/s00500-014-1332-7","volume":"19","author":"F Kuang","year":"2015","unstructured":"Kuang, F., Zhang, S., Jin, Z., & Xu, W. (2015). A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. Soft Computing, 19(5), 1187\u20131199. https:\/\/doi.org\/10.1007\/s00500-014-1332-7","journal-title":"Soft Computing"},{"key":"9393_CR3","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2018.11.010","volume":"148","author":"F Salo","year":"2019","unstructured":"Salo, F., Nassif, A. B., & Essex, A. (2019). Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection. Computing Networks, 148, 164\u2013175. https:\/\/doi.org\/10.1016\/j.comnet.2018.11.010","journal-title":"Computing Networks"},{"key":"9393_CR4","doi-asserted-by":"crossref","unstructured":"Sameera, N., & Shashi, M. (2020). Encoding approach for intrusion detection using PCA and KNN classifier. in Proceedings of the Third International Conference on Computational Intelligence and Informatics, pp. 187\u2013199.","DOI":"10.1007\/978-981-15-1480-7_15"},{"issue":"4","key":"9393_CR5","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","volume":"34","author":"F Amiri","year":"2011","unstructured":"Amiri, F., Rezaei Yousefi, M., Lucas, C., Shakery, A., & Yazdani, N. (2011). Mutual information-based feature selection for intrusion detection systems. Journal of Network Computing Applications, 34(4), 1184\u20131199. https:\/\/doi.org\/10.1016\/j.jnca.2011.01.002","journal-title":"Journal of Network Computing Applications"},{"issue":"14","key":"9393_CR6","doi-asserted-by":"publisher","first-page":"6371","DOI":"10.1016\/j.eswa.2014.04.019","volume":"41","author":"N Hoque","year":"2014","unstructured":"Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2014). MIFS-ND: A mutual information-based feature selection method. Expert Systems with Applications, 41(14), 6371\u20136385. https:\/\/doi.org\/10.1016\/j.eswa.2014.04.019","journal-title":"Expert Systems with Applications"},{"issue":"8","key":"9393_CR7","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1007\/s00521-015-1840-0","volume":"26","author":"HH Inbarani","year":"2015","unstructured":"Inbarani, H. H., Bagyamathi, M., & Azar, A. T. (2015). A novel hybrid feature selection method based on rough set and improved harmony search. Neural Computing and Applications, 26(8), 1859\u20131880. https:\/\/doi.org\/10.1007\/s00521-015-1840-0","journal-title":"Neural Computing and Applications"},{"key":"9393_CR8","doi-asserted-by":"publisher","unstructured":"Chen, R.C., Cheng, K.F., Chen, Y.H., & Hsieh, C.F. (2009). Using rough set and support vector machine for network intrusion detection system. in Proceedings\u20142009 1st Asian Conference on Intelligent Information and Database Systems, ACIIDS 2009, 2009, pp. 465\u2013470. https:\/\/doi.org\/10.1109\/ACIIDS.2009.59.","DOI":"10.1109\/ACIIDS.2009.59"},{"key":"9393_CR9","doi-asserted-by":"publisher","first-page":"2136","DOI":"10.1145\/1167253.1167288","volume":"2","author":"G Stein","year":"2005","unstructured":"Stein, G., Chen, B., Wu, A. S., & Hua, K. A. (2005). Decision tree classifier for network intrusion detection with GA-based feature selection. Proceedings of Annual Southeast Conference, 2, 2136\u20132141. https:\/\/doi.org\/10.1145\/1167253.1167288","journal-title":"Proceedings of Annual Southeast Conference"},{"key":"9393_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.knosys.2016.10.030","volume":"116","author":"Y Zhu","year":"2017","unstructured":"Zhu, Y., Liang, J., Chen, J., & Ming, Z. (2017). An improved NSGA-III algorithm for feature selection used in intrusion detection. Knowledge-Based System, 116, 74\u201385. https:\/\/doi.org\/10.1016\/j.knosys.2016.10.030","journal-title":"Knowledge-Based System"},{"key":"9393_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2017.07.005","volume":"134","author":"MR Gauthama Raman","year":"2017","unstructured":"Gauthama Raman, M. R., Somu, N., Kirthivasan, K., Liscano, R., & Shankar Sriram, V. S. (2017). An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowledge-Based System, 134, 1\u201312. https:\/\/doi.org\/10.1016\/j.knosys.2017.07.005","journal-title":"Knowledge-Based System"},{"key":"9393_CR12","doi-asserted-by":"publisher","unstructured":"Azad, C. & Jha, V.K. (2019). Decision tree and genetic algorithm based intrusion detection system. in Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017), pp. 141\u2013152. https:\/\/doi.org\/10.1007\/978-981-10-8234-4_13.","DOI":"10.1007\/978-981-10-8234-4_13"},{"issue":"5","key":"9393_CR13","doi-asserted-by":"publisher","first-page":"2670","DOI":"10.1016\/j.eswa.2014.11.009","volume":"42","author":"AS Eesa","year":"2015","unstructured":"Eesa, A. S., Orman, Z., & Brifcani, A. M. A. (2015). A novel feature-selection approach based on the cuttlefish optimization algorithm for intrusion detection systems. Expert Systems with Applications, 42(5), 2670\u20132679. https:\/\/doi.org\/10.1016\/j.eswa.2014.11.009","journal-title":"Expert Systems with Applications"},{"issue":"10","key":"9393_CR14","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TC.2016.2519914","volume":"65","author":"MA Ambusaidi","year":"2016","unstructured":"Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Transactions on Computers, 65(10), 2986\u20132998. https:\/\/doi.org\/10.1109\/TC.2016.2519914","journal-title":"IEEE Transactions on Computers"},{"issue":"9","key":"9393_CR15","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1007\/s00500-015-1942-8","volume":"21","author":"H Bostani","year":"2017","unstructured":"Bostani, H., & Sheikhan, M. (2017). Hybrid of binary gravitational search algorithm and mutual information for feature selection in intrusion detection systems. Soft Computing, 21(9), 2307\u20132324. https:\/\/doi.org\/10.1007\/s00500-015-1942-8","journal-title":"Soft Computing"},{"issue":"1","key":"9393_CR16","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.eswa.2011.07.032","volume":"39","author":"Y Li","year":"2012","unstructured":"Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., & Dai, K. (2012). An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Systems with Applications, 39(1), 424\u2013430. https:\/\/doi.org\/10.1016\/j.eswa.2011.07.032","journal-title":"Expert Systems with Applications"},{"issue":"10","key":"9393_CR17","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1016\/j.asoc.2012.05.004","volume":"12","author":"SW Lin","year":"2012","unstructured":"Lin, S. W., Ying, K. C., Lee, C. Y., & Lee, Z. J. (2012). An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Applied Soft Computing Journal, 12(10), 3285\u20133290. https:\/\/doi.org\/10.1016\/j.asoc.2012.05.004","journal-title":"Applied Soft Computing Journal"},{"key":"9393_CR18","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.protcy.2012.05.017","volume":"4","author":"S Mukherjee","year":"2012","unstructured":"Mukherjee, S., & Sharma, N. (2012). Intrusion detection using naive bayes classifier with feature reduction. Procedia Technology, 4, 119\u2013128. https:\/\/doi.org\/10.1016\/j.protcy.2012.05.017","journal-title":"Procedia Technology"},{"issue":"8","key":"9393_CR19","doi-asserted-by":"publisher","first-page":"4021","DOI":"10.3837\/tiis.2018.08.026","volume":"12","author":"K Siddique","year":"2018","unstructured":"Siddique, K., Akhtar, Z., Khan, M. A., Jung, Y. H., & Kim, Y. (2018). Developing an intrusion detection framework for high-speed big data networks: A comprehensive approach. KSII Transactions on Internet and Information Systems, 12(8), 4021\u20134037. https:\/\/doi.org\/10.3837\/tiis.2018.08.026","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"2","key":"9393_CR20","doi-asserted-by":"publisher","first-page":"309","DOI":"10.3233\/IDA-163337","volume":"22","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Li, Y., Zhang, T., Gadosey, P. K., & Liu, Z. (2018). Feature clustering dimensionality reduction based on affinity propagation. Intelligent Data Analysis, 22(2), 309\u2013323. https:\/\/doi.org\/10.3233\/IDA-163337","journal-title":"Intelligent Data Analysis"},{"issue":"1","key":"9393_CR21","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3233\/ida-2000-4103","volume":"4","author":"L Talavera","year":"2000","unstructured":"Talavera, L. (2000). Dependency-based feature selection for clustering symbolic data. Intelligent Data Analysis, 4(1), 19\u201328. https:\/\/doi.org\/10.3233\/ida-2000-4103","journal-title":"Intelligent Data Analysis"},{"issue":"4","key":"9393_CR22","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","volume":"29","author":"O Depren","year":"2005","unstructured":"Depren, O., Topallar, M., Anarim, E., & Ciliz, M. K. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications, 29(4), 713\u2013722. https:\/\/doi.org\/10.1016\/j.eswa.2005.05.002","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"9393_CR23","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., & Thomas, J. P. (2005). Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4), 295\u2013307. https:\/\/doi.org\/10.1016\/j.cose.2004.09.008","journal-title":"Computers & Security"},{"key":"9393_CR24","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1109\/ccece.2003.1226084","volume":"2","author":"Y Guan","year":"2003","unstructured":"Guan, Y., Ghorbani, A. A., & Belacel, N. (2003). Y-means: A clustering method for intrusion detection. Can. Conf. Electr. Comput. Eng., 2, 1083\u20131086. https:\/\/doi.org\/10.1109\/ccece.2003.1226084","journal-title":"Can. Conf. Electr. Comput. Eng."},{"issue":"1","key":"9393_CR25","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.jnca.2005.06.003","volume":"30","author":"S Peddabachigari","year":"2007","unstructured":"Peddabachigari, S., Abraham, A., Grosan, C., & Thomas, J. (2007). Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications, 30(1), 114\u2013132. https:\/\/doi.org\/10.1016\/j.jnca.2005.06.003","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"9393_CR26","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","author":"SS Sivatha Sindhu","year":"2012","unstructured":"Sivatha Sindhu, S. S., Geetha, S., & Kannan, A. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert System Application, 39(1), 129\u2013141. https:\/\/doi.org\/10.1016\/j.eswa.2011.06.013","journal-title":"Expert System Application"},{"issue":"4","key":"9393_CR27","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","volume":"41","author":"G Kim","year":"2014","unstructured":"Kim, G., Lee, S., & Kim, S. (2014). A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert System Application, 41(4), 1690\u20131700. https:\/\/doi.org\/10.1016\/j.eswa.2013.08.066","journal-title":"Expert System Application"},{"key":"9393_CR28","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-981-10-2738-3_37","volume":"625","author":"S Puthran","year":"2016","unstructured":"Puthran, S., & Shah, K. (2016). Intrusion detection using improved decision tree algorithm with binary and quad split. Communications in Computer and Information Science, 625, 427\u2013438. https:\/\/doi.org\/10.1007\/978-981-10-2738-3_37","journal-title":"Communications in Computer and Information Science"},{"key":"9393_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0058-9_1","author":"YJ Chew","year":"2020","unstructured":"Chew, Y. J., Ooi, S. Y., Wong, K.-S., & Pang, Y. H. (2020). Decision tree with sensitive pruning in network-based intrusion detection system. Computer Science and Technology. https:\/\/doi.org\/10.1007\/978-981-15-0058-9_1","journal-title":"Computer Science and Technology"},{"key":"9393_CR30","doi-asserted-by":"publisher","unstructured":"Ho, T.K. (1995). Random decision forests. in Proceedings of 3rd international conference on document analysis and recognition, vol. 1, pp. 278\u2013282. https:\/\/doi.org\/10.1109\/ICDAR.1995.598994.","DOI":"10.1109\/ICDAR.1995.598994"},{"key":"9393_CR31","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/11760191_33","volume":"3973","author":"DS Kim","year":"2006","unstructured":"Kim, D. S., Lee, S. M., & Park, J. S. (2006). Building lightweight intrusion detection system based on random forest. International Symposium on Neural Networks, 3973, 224\u2013230. https:\/\/doi.org\/10.1007\/11760191_33","journal-title":"International Symposium on Neural Networks"},{"key":"9393_CR32","doi-asserted-by":"publisher","unstructured":"Zhang, J. & Zulkernine, M. (2006). A hybrid network intrusion detection technique using random forests. in First International Conference on Availability, Reliability and Security (ARES\u201906), pp. 262\u2013269. https:\/\/doi.org\/10.1109\/ARES.2006.7.","DOI":"10.1109\/ARES.2006.7"},{"issue":"4","key":"9393_CR33","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.asej.2013.01.003","volume":"4","author":"RM Elbasiony","year":"2013","unstructured":"Elbasiony, R. M., Sallam, E. A., Eltobely, T. E., & Fahmy, M. M. (2013). A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Engineering and Journal, 4(4), 753\u2013762. https:\/\/doi.org\/10.1016\/j.asej.2013.01.003","journal-title":"Ain Shams Engineering and Journal"},{"issue":"1","key":"9393_CR34","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.ins.2014.03.043","volume":"285","author":"S Del R\u00edo","year":"2014","unstructured":"Del R\u00edo, S., L\u00f3pez, V., Ben\u00edtez, J. M., & Herrera, F. (2014). On the use of MapReduce for imbalanced big data using Random Forest. Information Science (Ny), 285(1), 112\u2013137. https:\/\/doi.org\/10.1016\/j.ins.2014.03.043","journal-title":"Information Science (Ny)"},{"key":"9393_CR35","doi-asserted-by":"crossref","unstructured":"Barbara, D., Wu, N. & Jajodia, S. (2001). Detecting novel network intrusions using bayes estimators. in Proceedings of the 2001 SIAM International Conference on Data Mining, pp. 1\u201317.","DOI":"10.1137\/1.9781611972719.28"},{"issue":"18","key":"9393_CR36","doi-asserted-by":"publisher","first-page":"13492","DOI":"10.1016\/j.eswa.2012.07.009","volume":"39","author":"L Koc","year":"2012","unstructured":"Koc, L., Mazzuchi, T. A., & Sarkani, S. (2012). A network intrusion detection system based on a Hidden Na\u00efve Bayes multiclass classifier. Expert Systems with Applications, 39(18), 13492\u201313500. https:\/\/doi.org\/10.1016\/j.eswa.2012.07.009","journal-title":"Expert Systems with Applications"},{"key":"9393_CR37","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-3-319-72823-0_53","volume":"211","author":"Y Wang","year":"2018","unstructured":"Wang, Y., et al. (2018). A novel intrusion detection system based on advanced Naive Bayesian classification. Lecture Notes in Institute for Computer Science and Social Telecommunication Engineering LNICST, 211, 581\u2013588.","journal-title":"Lecture Notes in Institute for Computer Science and Social Telecommunication Engineering LNICST"},{"issue":"3","key":"9393_CR38","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"NS Altman","year":"1992","unstructured":"Altman, N. S. (1992). An introduction to kernel and nearest-neighbor nonparametric regression. American Statistician, 46(3), 175\u2013185. https:\/\/doi.org\/10.1080\/00031305.1992.10475879","journal-title":"American Statistician"},{"issue":"5","key":"9393_CR39","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.patcog.2003.09.011","volume":"37","author":"Y Liu","year":"2004","unstructured":"Liu, Y., Chen, K., Liao, X., & Zhang, W. (2004). A genetic clustering method for intrusion detection. Pattern Recognition, 37(5), 927\u2013942. https:\/\/doi.org\/10.1016\/j.patcog.2003.09.011","journal-title":"Pattern Recognition"},{"issue":"4","key":"9393_CR40","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal, 16(4), 507\u2013521. https:\/\/doi.org\/10.1007\/s00778-006-0002-5","journal-title":"The VLDB Journal"},{"key":"9393_CR41","doi-asserted-by":"publisher","unstructured":"Om, H. & Kundu, A. (2012). A hybrid system for reducing the false alarm rate of anomaly intrusion detection system. 2012 1st International Conference on Recent Advance Information Technology RAIT-2012, pp. 131\u2013136. https:\/\/doi.org\/10.1109\/RAIT.2012.6194493.","DOI":"10.1109\/RAIT.2012.6194493"},{"issue":"2011","key":"9393_CR42","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.proeng.2012.01.849","volume":"30","author":"AP Muniyandi","year":"2012","unstructured":"Muniyandi, A. P., Rajeswari, R., & Rajaram, R. (2012). Network anomaly detection by cascading k-Means clustering and C4.5 decision tree algorithm. Procedia Engineering, 30(2011), 174\u2013182. https:\/\/doi.org\/10.1016\/j.proeng.2012.01.849","journal-title":"Procedia Engineering"},{"issue":"1","key":"9393_CR43","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.knosys.2015.01.009","volume":"78","author":"WC Lin","year":"2015","unstructured":"Lin, W. C., Ke, S. W., & Tsai, C. F. (2015). CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-Based System, 78(1), 13\u201321. https:\/\/doi.org\/10.1016\/j.knosys.2015.01.009","journal-title":"Knowledge-Based System"},{"issue":"4","key":"9393_CR44","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"TTT Nguyen","year":"2008","unstructured":"Nguyen, T. T. T., & Armitage, G. (2008). A survey of techniques for internet traffic classification using machine learning. IEEE Communication Survey Tutorials, 10(4), 56\u201376. https:\/\/doi.org\/10.1109\/SURV.2008.080406","journal-title":"IEEE Communication Survey Tutorials"},{"issue":"3","key":"9393_CR45","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., & Vapnik, V. (1995). Support-vector networks. Machine Learning, 20(3), 273\u2013297.","journal-title":"Machine Learning"},{"key":"9393_CR46","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1109\/ijcnn.2002.1007774","volume":"2","author":"S Mukkamala","year":"2002","unstructured":"Mukkamala, S., Janoski, G., & Sung, A. (2002). Intrusion detection using neural networks and support vector machines. Proceedings of International Joint Conference Neural Networks, 2, 1702\u20131707. https:\/\/doi.org\/10.1109\/ijcnn.2002.1007774","journal-title":"Proceedings of International Joint Conference Neural Networks"},{"key":"9393_CR47","doi-asserted-by":"publisher","unstructured":"Kim, D.S. & Park, J.S. (2003). Network-based intrusion detection with support vector machines. Lecture Notes Computer Science (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 2662, pp. 747\u2013756. https:\/\/doi.org\/10.1007\/978-3-540-45235-5_73.","DOI":"10.1007\/978-3-540-45235-5_73"},{"key":"9393_CR48","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen, W. L., Othman, Z. A., & Nazri, M. Z. A. (2017). Multi-level hybrid support vector machine and extreme learning machine based on modified K-means for intrusion detection system. Expert Systems with Applications, 67, 296\u2013303. https:\/\/doi.org\/10.1016\/j.eswa.2016.09.041","journal-title":"Expert Systems with Applications"},{"key":"9393_CR49","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.suscom.2019.06.002","volume":"23","author":"GM Borkar","year":"2019","unstructured":"Borkar, G. M., Patil, L. H., Dalgade, D., & Hutke, A. (2019). A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept. Sustainable Computer Informatics System, 23, 120\u2013135. https:\/\/doi.org\/10.1016\/j.suscom.2019.06.002","journal-title":"Sustainable Computer Informatics System"},{"key":"9393_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107168","volume":"173","author":"S Hosseini","year":"2020","unstructured":"Hosseini, S., & Zade, B. M. H. (2020). New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Computer Networks, 173, 107168. https:\/\/doi.org\/10.1016\/j.comnet.2020.107168","journal-title":"Computer Networks"},{"key":"9393_CR51","unstructured":"Ryan, J., Lin, M.J., & Miikkulainen, R. (1998). Iintrusion detection with neural networks. Advance Neural Information Processing System, pp. 943\u2013949."},{"issue":"4","key":"9393_CR52","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/S1389-1286(00)00140-7","volume":"34","author":"RP Lippmann","year":"2000","unstructured":"Lippmann, R. P., & Cunningham, R. K. (2000). Improving intrusion detection performance using keyword selection and neural networks. Computer Networks, 34(4), 597\u2013603. https:\/\/doi.org\/10.1016\/S1389-1286(00)00140-7","journal-title":"Computer Networks"},{"key":"9393_CR53","unstructured":"Sung, A.H., & Mukkamala, S. (2003). Identifying important features for intrusion detection using support vector machines and neural networks department of computer science new Mexico institute of mining and technology. Symposium A Q. J. Model Foreign Lit., pp. 3\u201310."},{"issue":"6","key":"9393_CR54","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.patrec.2004.09.045","volume":"26","author":"C Zhang","year":"2005","unstructured":"Zhang, C., Jiang, J., & Kamel, M. (2005). Intrusion detection using hierarchical neural networks. Pattern Recognition Letter, 26(6), 779\u2013791. https:\/\/doi.org\/10.1016\/j.patrec.2004.09.045","journal-title":"Pattern Recognition Letter"},{"issue":"7\u20139","key":"9393_CR55","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.neucom.2006.10.146","volume":"70","author":"G Liu","year":"2007","unstructured":"Liu, G., Yi, Z., & Yang, S. (2007). A hierarchical intrusion detection model based on the PCA neural networks. Neurocomputing, 70(7\u20139), 1561\u20131568. https:\/\/doi.org\/10.1016\/j.neucom.2006.10.146","journal-title":"Neurocomputing"},{"issue":"15","key":"9393_CR56","doi-asserted-by":"publisher","first-page":"3024","DOI":"10.1016\/j.ins.2007.11.028","volume":"178","author":"ST Powers","year":"2008","unstructured":"Powers, S. T., & He, J. (2008). A hybrid artificial immune system and Self Organising Map for network intrusion detection. Information Science (Ny), 178(15), 3024\u20133042. https:\/\/doi.org\/10.1016\/j.ins.2007.11.028","journal-title":"Information Science (Ny)"},{"issue":"9","key":"9393_CR57","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Mab, J., & Huang, L. (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications, 37(9), 6225\u20136232. https:\/\/doi.org\/10.1016\/j.eswa.2010.02.102","journal-title":"Expert Systems with Applications"},{"key":"9393_CR58","unstructured":"Vancha, M.R., Prakash Reddy, I.R., & Reddy, K.A. (2019). Intrusion detection system using multilayer neural networks, vol. 11, no. 5. Springer, Singapore."},{"key":"9393_CR59","doi-asserted-by":"crossref","unstructured":"Rodda, S. (2018). Network intrusion detection systems using neural networks. in Advances in Intelligent Systems and Computing, vol. 672, Springer Singapore, pp. 903\u2013908.","DOI":"10.1007\/978-981-10-7512-4_89"},{"issue":"10","key":"9393_CR60","doi-asserted-by":"publisher","first-page":"11994","DOI":"10.1016\/j.eswa.2009.05.029","volume":"36","author":"CF Tsai","year":"2009","unstructured":"Tsai, C. F., Hsu, Y. F., Lin, C. Y., & Lin, W. Y. (2009). Intrusion detection by machine learning: A review. Expert Systems with Applications, 36(10), 11994\u201312000. https:\/\/doi.org\/10.1016\/j.eswa.2009.05.029","journal-title":"Expert Systems with Applications"},{"key":"9393_CR61","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.eswa.2017.07.005","volume":"88","author":"IM Akashdeep","year":"2017","unstructured":"Akashdeep, I. M., & Kumar, N. (2017). A feature reduced intrusion detection system using ANN classifier. Expert System Application, 88, 249\u2013257. https:\/\/doi.org\/10.1016\/j.eswa.2017.07.005","journal-title":"Expert System Application"},{"key":"9393_CR62","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.eswa.2019.04.017","volume":"130","author":"T Chandak","year":"2017","unstructured":"Chandak, T., Shukla, S., & Wadhvani, R. (2017). An analysis of \u2018A feature reduced intrusion detection system using ANN classifier\u2019 by Akashdeep et al. expert systems with applications. Expert Systems with Applications, 130, 79\u201383. https:\/\/doi.org\/10.1016\/j.eswa.2019.04.017","journal-title":"Expert Systems with Applications"},{"key":"9393_CR63","doi-asserted-by":"publisher","unstructured":"Ambusaidi, M.A., He, X., Tan, Z., Nanda, P., Lu, L.F., & Nagar, U.T. (2015). A novel feature selection approach for intrusion detection data classification. Proceedings\u20142014 IEEE 13th International Conference Trust Security Private Computing Communication Trust 2014. pp. 82\u201389. https:\/\/doi.org\/10.1109\/TrustCom.2014.15.","DOI":"10.1109\/TrustCom.2014.15"},{"issue":"6","key":"9393_CR64","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1007\/s00521-015-1964-2","volume":"27","author":"BM Aslahi-Shahri","year":"2016","unstructured":"Aslahi-Shahri, B. M., et al. (2016). A hybrid method consisting of GA and SVM for intrusion detection system. Neural Computing and Applications, 27(6), 1669\u20131676. https:\/\/doi.org\/10.1007\/s00521-015-1964-2","journal-title":"Neural Computing and Applications"},{"issue":"1","key":"9393_CR65","doi-asserted-by":"publisher","first-page":"157","DOI":"10.22044\/JADM.2017.979","volume":"6","author":"L Khalvati","year":"2018","unstructured":"Khalvati, L., Keshtgary, M., & Rikhtegar, N. (2018). Intrusion detection based on a novel hybrid learning approach. Journal of AI data Mining, 6(1), 157\u2013162. https:\/\/doi.org\/10.22044\/JADM.2017.979","journal-title":"Journal of AI data Mining"},{"key":"9393_CR66","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.jisa.2018.11.007","volume":"44","author":"S Mohammadi","year":"2019","unstructured":"Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M., & Karimipour, H. (2019). Cyber intrusion detection by combined feature selection algorithm. Journal of Information Security Application, 44, 80\u201388. https:\/\/doi.org\/10.1016\/j.jisa.2018.11.007","journal-title":"Journal of Information Security Application"},{"key":"9393_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113249","author":"H Alazzam","year":"2020","unstructured":"Alazzam, H., Sharieh, A., & Sabri, K. E. (2020). A feature selection algorithm for intrusion detection system based on Pigeon Inspired Optimizer. Expert System Application. https:\/\/doi.org\/10.1016\/j.eswa.2020.113249","journal-title":"Expert System Application"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09393-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09393-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09393-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:19:51Z","timestamp":1651861191000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09393-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,2]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["9393"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09393-0","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-305354\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,2]]},"assertion":[{"value":"14 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declares that there is no conflicts of interest with respect to the research, authorship and\/or publication of this paper anywhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}]}}