{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:52:23Z","timestamp":1725083543443},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,10,21]],"date-time":"2009-10-21T00:00:00Z","timestamp":1256083200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1007\/s11633-009-0406-y","type":"journal-article","created":{"date-parts":[[2009,10,20]],"date-time":"2009-10-20T09:01:49Z","timestamp":1256029309000},"page":"406-414","source":"Crossref","is-referenced-by-count":13,"title":["A neuro-genetic based short-term forecasting framework for network intrusion prediction system"],"prefix":"10.1007","volume":"6","author":[{"given":"Siva S.","family":"Sivatha Sindhu","sequence":"first","affiliation":[]},{"given":"S.","family":"Geetha","sequence":"additional","affiliation":[]},{"given":"M.","family":"Marikannan","sequence":"additional","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,21]]},"reference":[{"issue":"7","key":"406_CR1","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TC.2002.1017701","volume":"51","author":"N. Ye","year":"2002","unstructured":"N. Ye, S. M. Emran, Q. Chen, S. Vilbert. Multivariate Statistical Analysis of Audit Trails for Host-based Intrusion Detection. IEEE Transactions on Computers, vol. 51, no. 7, pp. 810\u2013820, 2002.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"406_CR2","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1049\/iet-ifs:20055097","volume":"1","author":"D. Naccache","year":"2007","unstructured":"D. Naccache. Secure and Practical Identity-based Encryption. IET Information Security, vol. 1, no. 2, pp. 59\u201364, 2007.","journal-title":"IET Information Security"},{"issue":"2","key":"406_CR3","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s11633-008-0202-0","volume":"5","author":"C. W. Chang","year":"2008","unstructured":"C. W. Chang, H. Pan, H. Y. Jia. A Secure Short Message Communication Protocol. International Journal of Automation and Computing, vol. 5, no. 2, pp. 202\u2013207, 2008.","journal-title":"International Journal of Automation and Computing"},{"issue":"4","key":"406_CR4","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/TSMCB.2007.896406","volume":"37","author":"R. Curry","year":"2007","unstructured":"R. Curry, P. Lichodzijewski, M. I. Heywood. Scaling Genetic Programming to Large Datasets Using Hierarchical Dynamic Subset Selection. IEEE Transactions on Systems, Man, and Cybernetics \u2014 Part B: Cybernetics, vol. 37, no. 4, pp. 1065\u20131073, 2007.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics \u2014 Part B: Cybernetics"},{"issue":"3","key":"406_CR5","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s11633-007-0243-9","volume":"4","author":"S. X. Yang","year":"2007","unstructured":"S. X. Yang, R. Tin. A Hybrid Immigrants Scheme for Genetic Algorithms in Dynamic Environments. International Journal of Automation and Computing, vol. 4, no. 3, pp. 243\u2013254, 2007.","journal-title":"International Journal of Automation and Computing"},{"issue":"2","key":"406_CR6","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1109\/TSMCB.2006.885306","volume":"37","author":"Z. W. Yu","year":"2007","unstructured":"Z. W. Yu, J. J. P. Tsai, T. Weigert. An Automatically Tuning Intrusion Detection System. IEEE Transactions on Systems, Man, and Cybernetics \u2014 Part B: Cybernetics, vol. 37, no. 2, pp. 373\u2013384, 2007.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics \u2014 Part B: Cybernetics"},{"issue":"1","key":"406_CR7","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.datak.2006.01.003","volume":"60","author":"F. Berzal","year":"2007","unstructured":"F. Berzal, J. C. Cubero. An Effective Algorithm for Mining Subspace Clusters in Categorical Datasets. Data and Knowledge Engineering, vol. 60, no. 1, pp. 51\u201370, 2007.","journal-title":"Data and Knowledge Engineering"},{"key":"406_CR8","doi-asserted-by":"crossref","first-page":"5854","DOI":"10.1109\/WCICA.2006.1714200","volume":"2","author":"L. Z. Xiao","year":"2006","unstructured":"L. Z. Xiao, Z. Q. Shao, G. Liu. K-means Algorithm Based on Particle Swarm Optimization Algorithm for Anomaly Intrusion Detection. In Proceedings of the 6thWorld Congress on Intelligent Control and Automation, IEEE Press, vol. 2, pp. 5854\u20135858, 2006.","journal-title":"Proceedings of the 6thWorld Congress on Intelligent Control and Automation"},{"issue":"1","key":"406_CR9","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1109\/TNN.2002.804317","volume":"14","author":"F. H. F. Leung","year":"2003","unstructured":"F. H. F. Leung, H. K. Lam, S. H. Ling, P. K. S. Tam. Tuning of the Structure and Parameters of a Neural Network Using an Improved Genetic Algorithm. IEEE Transactions on Neural Networks, vol. 14, no. 1, pp. 79\u201388, 2003.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"406_CR10","unstructured":"S. M. Bridges, R. B. Vaughn. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. In Proceedings of the 12th Annual Canadian Information Technology Security Symposium, Baltimore, USA, pp. 109\u2013122, 2000."},{"key":"406_CR11","volume-title":"A Genetic Algorithm Approach to Network Intrusion Detection","author":"W. Li","year":"2004","unstructured":"W. Li. A Genetic Algorithm Approach to Network Intrusion Detection, SANS Institute, USA, 2004."},{"issue":"8","key":"406_CR12","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1002\/for.844","volume":"21","author":"K. Triantafyllopoulos","year":"2002","unstructured":"K. Triantafyllopoulos, J. Pikoulas. Multivariate Bayesian Regression Applied to the Problem of Network Security. Journal of Forecasting, vol. 21,no. 8, pp. 579\u2013594, 2002.","journal-title":"Journal of Forecasting"},{"key":"406_CR13","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/ICNC.2007.115","volume":"3","author":"F. Min","year":"2007","unstructured":"F. Min. A Novel Intrusion Detection Method Based on Combining Ensemble Learning with Induction-enhanced Particle Swarm Algorithm. In Proceedings of the 3rd International Conference on Natural Computation, IEEE Press, vol. 3, pp. 520\u2013524, 2007.","journal-title":"Proceedings of the 3rd International Conference on Natural Computation"},{"issue":"4","key":"406_CR14","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/TEVC.2005.859468","volume":"10","author":"D. Parrott","year":"2006","unstructured":"D. Parrott, X. D. Li. Locating and Tracking Multiple Dynamic Optima by a Particle Swarm Model Using Speciation. IEEE Transactions on Evolutionary Computation, vol. 10, no. 4, pp. 440\u2013458, 2006.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"1","key":"406_CR15","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s11633-008-0067-2","volume":"5","author":"S. C. Chiam","year":"2008","unstructured":"S. C. Chiam, K. C. Tan, A. S. Al Mamum. Evolutionary Multi-objective Portfolio Optimization in Practical Context. International Journal of Automation and Computing, vol. 5, no. 1, pp. 67\u201380, 2008.","journal-title":"International Journal of Automation and Computing"},{"key":"406_CR16","unstructured":"Java Neural Network Simulator, Department of Computer Architecture, Wilhelm-Schickard-Institute for Computer Science, University of Tbingen, [online], Available: http:\/\/www-ra.informatik.uni-tuebingen.de\/downloads\/JavaNNS ."},{"key":"406_CR17","unstructured":"KDD-cup 1999 data, [Online], Available: http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html , October 28, 1999."}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-009-0406-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-009-0406-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-009-0406-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T06:57:05Z","timestamp":1685170625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-009-0406-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,21]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["406"],"URL":"https:\/\/doi.org\/10.1007\/s11633-009-0406-y","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"value":"1476-8186","type":"print"},{"value":"1751-8520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,21]]}}}