{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T16:44:37Z","timestamp":1769013877457,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:00:00Z","timestamp":1548288000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"nnsfc","doi-asserted-by":"crossref","award":["61572184"],"award-info":[{"award-number":["61572184"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s12065-019-00199-5","type":"journal-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T17:14:47Z","timestamp":1548350087000},"page":"131-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["A new evolutionary neural networks based on intrusion detection systems using locust swarm optimization"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8358-8759","authenticated-orcid":false,"given":"Ilyas","family":"Benmessahel","sequence":"first","affiliation":[]},{"given":"Kun","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Mouna","family":"Chellal","sequence":"additional","affiliation":[]},{"given":"Thabo","family":"Semong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"199_CR1","doi-asserted-by":"crossref","unstructured":"Xie G, Xie K, Huang J, Wang X, Chen Y, Wen J (2017) Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detection. In: 2017 IEEE Conference on computer communications (INFOCOM)","DOI":"10.1109\/INFOCOM.2017.8057217"},{"key":"199_CR2","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.procs.2015.07.040","volume":"55","author":"SMH Bamakan","year":"2015","unstructured":"Bamakan SMH, Amiri B, Mirzabagheri M, Shi Y (2015) A new intrusion detection approach using pso based multiple criteria linear programming. Procedia Comput Sci 55:231\u2013237","journal-title":"Procedia Comput Sci"},{"key":"199_CR3","first-page":"11","volume-title":"A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification","author":"K Demertzis","year":"2014","unstructured":"Demertzis K, Iliadis L (2014) A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification. Springer International Publishing, Cham, pp 11\u201323"},{"issue":"10","key":"199_CR4","doi-asserted-by":"publisher","first-page":"2687","DOI":"10.1007\/s00500-015-1967-z","volume":"21","author":"T Dash","year":"2017","unstructured":"Dash T (2017) A study on intrusion detection using neural networks trained with evolutionary algorithms. Soft Comput 21(10):2687\u20132700","journal-title":"Soft Comput"},{"key":"199_CR5","first-page":"109","volume-title":"Unsupervised anomaly-based malware detection using hardware features","author":"A Tang","year":"2014","unstructured":"Tang A, Sethumadhavan S, Stolfo SJ (2014) Unsupervised anomaly-based malware detection using hardware features. Springer International Publishing, Cham, pp 109\u2013129"},{"key":"199_CR6","first-page":"27","volume-title":"Detection approaches","author":"AA Ghorbani","year":"2010","unstructured":"Ghorbani AA, Lu W, Tavallaee M (2010) Detection approaches. Springer, Boston, pp 27\u201353"},{"key":"199_CR7","unstructured":"Rastegari S (2015) Intelligent network intrusion detection using an evolutionary computation approach"},{"key":"199_CR8","unstructured":"Tian WJ, Liu JC (2010) Network intrusion detection analysis with neural network and particle swarm optimization algorithm. In: 2010 Chinese control and decision conference, pp 1749\u20131752"},{"issue":"6","key":"199_CR9","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1016\/j.scient.2011.08.025","volume":"18","author":"M Lotfi Shahreza","year":"2011","unstructured":"Lotfi Shahreza M, Moazzami D, Moshiri B, Delavar MR (2011) Anomaly detection using a self-organizing map and particle swarm optimization. Sci Iran 18(6):1460\u20131468","journal-title":"Sci Iran"},{"key":"199_CR10","first-page":"399","volume-title":"Network intrusion detection using genetic algorithm and neural network","author":"A Gomathy","year":"2011","unstructured":"Gomathy A, Lakshmipathi B (2011) Network intrusion detection using genetic algorithm and neural network. Springer, Berlin Heidelberg, Berlin, pp 399\u2013408"},{"key":"199_CR11","doi-asserted-by":"crossref","unstructured":"Pal B, Hasan MAM (2012) Neural network amp; genetic algorithm based approach to network intrusion detection amp; comparative analysis of performance. In: 2012 15th international conference on computer and information technology (ICCIT), pp 150\u2013154","DOI":"10.1109\/ICCITechn.2012.6509809"},{"key":"199_CR12","doi-asserted-by":"crossref","unstructured":"Ozturk C, Karaboga D (2011) Hybrid artificial bee colony algorithm for neural network training. In: 2011 IEEE congress of evolutionary computation (CEC), pp 84\u201388","DOI":"10.1109\/CEC.2011.5949602"},{"key":"199_CR13","first-page":"153","volume-title":"Optimizing functional link neural network learning using modified bee colony on multi-class classifications","author":"YMM Hassim","year":"2014","unstructured":"Hassim YMM, Ghazali R (2014) Optimizing functional link neural network learning using modified bee colony on multi-class classifications. Springer, Berlin, pp 153\u2013159"},{"key":"199_CR14","first-page":"311","volume-title":"Modelling of intrusion detection system using artificial intelligence\u2014evaluation of performance measures","author":"M Chattopadhyay","year":"2015","unstructured":"Chattopadhyay M (2015) Modelling of intrusion detection system using artificial intelligence\u2014evaluation of performance measures. Springer International Publishing, Cham, pp 311\u2013336"},{"issue":"7","key":"199_CR15","first-page":"55","volume":"5","author":"HA Akkar","year":"2016","unstructured":"Akkar HA, Mahdi FR (2016) Evolutionary algorithms for neural networks binary and real data classification. Int J Sci Technol Res 5(7):55\u201360","journal-title":"Int J Sci Technol Res"},{"issue":"10","key":"199_CR16","first-page":"42","volume":"96","author":"OA Abdalla","year":"2014","unstructured":"Abdalla OA, Elfaki AO, Almurtadha YM (2014) Optimizing the multilayer feed-forward artificial neural networks architecture and training parameters using genetic algorithm. Int J Comput Appl 96(10):42\u201348 Full text available","journal-title":"Int J Comput Appl"},{"key":"199_CR17","first-page":"61","volume":"2015","author":"BA Garro","year":"2015","unstructured":"Garro BA, V\u00e1zquez RA (2015) Designing artificial neural networks using particle swarm optimization algorithms. Intell Neurosci 2015:61","journal-title":"Intell Neurosci"},{"issue":"2","key":"199_CR18","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s10489-016-0767-1","volume":"45","author":"H Faris","year":"2016","unstructured":"Faris H, Aljarah I, Mirjalili S (2016) Training feedforward neural networks using multi-verse optimizer for binary classification problems. Appl Intell 45(2):322\u2013332","journal-title":"Appl Intell"},{"issue":"1","key":"199_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7763\/IJMLC.2015.V5.473","volume":"5","author":"NT Bui","year":"2015","unstructured":"Bui NT, Hasegawa H (2015) Training artificial neural network using modification of differential evolution algorithm. Int J Mach Learn Comput 5(1):1\u20136","journal-title":"Int J Mach Learn Comput"},{"issue":"3","key":"199_CR20","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s10462-011-9270-6","volume":"39","author":"S Ding","year":"2013","unstructured":"Ding S, Li H, Chunyang S, Junzhao Y, Jin F (2013) Evolutionary artificial neural networks: a review. Artif Intell Rev 39(3):251\u2013260","journal-title":"Artif Intell Rev"},{"issue":"805357","key":"199_CR21","first-page":"25","volume":"2015","author":"E Cuevas","year":"2015","unstructured":"Cuevas E, Gonz\u00e1lez A, Zald\u00edvar D, P\u00e9rez-Cisneros M (2015) Multithreshold segmentation by using an algorithm based on the behavior of locust swarms. Math Probl Eng 2015(805357):25","journal-title":"Math Probl Eng"},{"issue":"4","key":"199_CR22","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1007\/s10489-017-0937-9","volume":"47","author":"A Gonz\u00e1lez","year":"2017","unstructured":"Gonz\u00e1lez A, Cuevas E, Fausto F, Valdivia A, Rojas R (2017) A template matching approach based on the behavior of swarms of locust. Appl Intell 47(4):1087\u20131098","journal-title":"Appl Intell"},{"issue":"6","key":"199_CR23","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W Lee","year":"2000","unstructured":"Lee W, Stolfo SJ, Mok KW (2000) Adaptive intrusion detection: a data mining approach. Artif Intell Rev 14(6):533\u2013567","journal-title":"Artif Intell Rev"},{"key":"199_CR24","doi-asserted-by":"crossref","unstructured":"Ahmad I, Abdullah AB, Alghamdi AS (2009) Application of artificial neural network in detection of probing attacks. In: 2009 IEEE symposium on industrial electronics applications, vol 2, pp 557\u2013562","DOI":"10.1109\/ISIEA.2009.5356382"},{"key":"199_CR25","unstructured":"Li J, Zhang G-Y, Gu G-C (2004) The research and implementation of intelligent intrusion detection system based on artificial neural network. In: Proceedings of 2004 international conference on machine learning and cybernetics (IEEE Cat. No.04EX826), vol 5, pp 3178\u20133182"},{"issue":"1","key":"199_CR26","first-page":"19","volume":"17","author":"H Berlin","year":"2017","unstructured":"Berlin H, Djionang L, Tindo G (2017) A new networks intrusion detection architecture based on neural networks. Glob J Comput Sci Technol Netw Web Secur 17(1):19\u201327","journal-title":"Glob J Comput Sci Technol Netw Web Secur"},{"key":"199_CR27","first-page":"332","volume-title":"Network intrusion detection based on neural networks and D-S evidence","author":"C Lu","year":"2016","unstructured":"Lu C, Zhai L, Liu T, Li N (2016) Network intrusion detection based on neural networks and D-S evidence. Springer International Publishing, Cham, pp 332\u2013343"},{"key":"199_CR28","doi-asserted-by":"crossref","unstructured":"Gonzalez F, Gomez J, Kaniganti M, Dasgupta D (2003) An evolutionary approach to generate fuzzy anomaly (attack) signatures. In: IEEE systems, man and cybernetics society information assurance workshop, 2003, pp 251\u2013259","DOI":"10.1109\/SMCSIA.2003.1232430"},{"issue":"4","key":"199_CR29","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1007\/s11767-004-0189-9","volume":"23","author":"X Qinzhen","year":"2006","unstructured":"Qinzhen X, Yang L, Zhao Q, He Z (2006) A novel intrusion detection mode based on understandable neural network trees. J Electrons (China) 23(4):574\u2013579","journal-title":"J Electrons (China)"},{"key":"199_CR30","doi-asserted-by":"crossref","unstructured":"Ke G, Hong YH (2014) The research of network intrusion detection technology based on genetic algorithm and bp neural network. In: Frontiers of manufacturing science and measuring technology IV, vol 599 of applied mechanics and materials. Trans Tech Publications, pp 726\u2013730","DOI":"10.4028\/www.scientific.net\/AMM.599-601.726"},{"issue":"3","key":"199_CR31","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/TSMCB.2005.860136","volume":"36","author":"S-J Han","year":"2005","unstructured":"Han S-J, Cho S-B (2005) Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans Syst Man Cybern Part B (Cybernetics) 36(3):559\u2013570","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybernetics)"},{"key":"199_CR32","doi-asserted-by":"crossref","unstructured":"Michailidis E, Katsikas SK, Georgopoulos E (2008) Intrusion detection using evolutionary neural networks. In: 2008 Panhellenic conference on informatics, pp 8\u201312","DOI":"10.1109\/PCI.2008.53"},{"issue":"6","key":"199_CR33","first-page":"247","volume":"9","author":"C Qiu","year":"2015","unstructured":"Qiu C, Shan J (2015) Research on intrusion detection algorithm based on bp neural network. Int J Secur Appl 9(6):247\u2013259","journal-title":"Int J Secur Appl"},{"key":"199_CR34","first-page":"59","volume-title":"The role of artificial neural networks in evolutionary optimisation: a review","author":"M Maarouf","year":"2015","unstructured":"Maarouf M, Sosa A, Galv\u00e1n B, Greiner D, Winter G, Mendez M, Aguasca R (2015) The role of artificial neural networks in evolutionary optimisation: a review. Springer International Publishing, Cham, pp 59\u201376"},{"key":"199_CR35","series-title":"International encyclopedia of geography","first-page":"1","volume-title":"Artificial neural networks","author":"A-X Zhu","year":"2017","unstructured":"Zhu A-X (2017) Artificial neural networks. In: International encyclopedia of geography. American Cancer Society, Atlanta, Georgia, US, pp 1\u20136"},{"issue":"2","key":"199_CR36","doi-asserted-by":"publisher","first-page":"292","DOI":"10.3390\/a8020292","volume":"8","author":"J-F Chen","year":"2015","unstructured":"Chen J-F, Do QH, Hsieh H-N (2015) Training artificial neural networks by a hybrid pso-cs algorithm. Algorithms 8(2):292\u2013308","journal-title":"Algorithms"},{"key":"199_CR37","first-page":"211","volume-title":"An analysis of locust swarms on large scale global optimization problems","author":"S Chen","year":"2009","unstructured":"Chen S (2009) An analysis of locust swarms on large scale global optimization problems. Springer, Berlin, pp 211\u2013220"},{"issue":"6","key":"199_CR38","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1504\/IJBIC.2015.073178","volume":"7","author":"E Cuevas","year":"2015","unstructured":"Cuevas E, Gonz\u00e1lez A, Zald\u00edvar D, P\u00e9rez-Cisneros M (2015) An optimisation algorithm based on the behaviour of locust swarms. Int J Bioinspired Comput 7(6):402\u2013407","journal-title":"Int J Bioinspired Comput"},{"key":"199_CR39","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1140\/epjst\/e2008-00633-y","volume":"157","author":"CM Topaz","year":"2008","unstructured":"Topaz CM, Bernoff AJ, Logan S, Toolson W (2008) A model for rolling swarms of locusts. Eur Phys J Spec Top 157:93\u2013109","journal-title":"Eur Phys J Spec Top"},{"key":"199_CR40","unstructured":"Cortes C, Gonzalvo X, Kuznetsov V, Mohri M, Yang S (2016) Adanet: adaptive structural learning of artificial neural networks. CoRR. \n                    arXiv:abs\/1607.01097"},{"key":"199_CR41","unstructured":"The Cyber Range Lab of the Australian Centre\u00a0for Cyber Security\u00a0(ACCS). Unsw-nb15 dataset. \n                    http:\/\/www.accs.unsw.adfa.edu.au\/\n                    \n                  . Accessed May 2015"},{"key":"199_CR42","doi-asserted-by":"crossref","unstructured":"Moustafa N, Slay J (Nov 2015) Unsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set). In: 2015 military communications and information systems conference (MilCIS), pp 1\u20136","DOI":"10.1109\/MilCIS.2015.7348942"},{"issue":"1\u20133","key":"199_CR43","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1080\/19393555.2015.1125974","volume":"25","author":"N Moustafa","year":"2016","unstructured":"Moustafa N, Slay J (2016) The evaluation of network anomaly detection systems: statistical analysis of the unsw-nb15 data set and the comparison with the kdd99 data set. Inf Secur J A Glob Perspect 25(1\u20133):18\u201331","journal-title":"Inf Secur J A Glob Perspect"},{"issue":"Supplement C","key":"199_CR44","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","volume":"70","author":"C Khammassi","year":"2017","unstructured":"Khammassi C, Krichen S (2017) A ga-lr wrapper approach for feature selection in network intrusion detection. Comput Secur 70(Supplement C):255\u2013277","journal-title":"Comput Secur"},{"key":"199_CR45","unstructured":"NSLKDD. Nsl-kdd dataset. \n                    http:\/\/nsl.cs.unb.ca\/NSL-KDD\n                    \n                  . Accesses Jun 2013"},{"issue":"Supplement C","key":"199_CR46","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.future.2013.06.027","volume":"37","author":"W Feng","year":"2014","unstructured":"Feng W, Zhang Q, Hu G, Huang JX (2014) Mining network data for intrusion detection through combining svms with ant colony networks. Future Gener Comput Syst 37(Supplement C):127\u2013140 (Special section: innovative methods and algorithms for advanced data-intensive computing special section: semantics, intelligent processing and services for big data special section: advances in data-intensive modelling and simulation special section: hybrid intelligence for growing internet and its applications)","journal-title":"Future Gener Comput Syst"},{"issue":"9","key":"199_CR47","doi-asserted-by":"publisher","first-page":"3014","DOI":"10.1016\/j.asoc.2012.04.020","volume":"12","author":"YY Chung","year":"2012","unstructured":"Chung YY, Wahid N (2012) A hybrid network intrusion detection system using simplified swarm optimization (sso). Appl Soft Comput 12(9):3014\u20133022","journal-title":"Appl Soft Comput"},{"key":"199_CR48","doi-asserted-by":"crossref","unstructured":"Tang TA, Mhamdi L, McLernon D, Zaidi SAR, Ghogho M (2016) Deep learning approach for network intrusion detection in software defined networking. In: 2016 international conference on wireless networks and mobile communications (WINCOM), pp 258\u2013263","DOI":"10.1109\/WINCOM.2016.7777224"},{"issue":"Supplement C","key":"199_CR49","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.neucom.2016.06.021","volume":"214","author":"C Guo","year":"2016","unstructured":"Guo C, Ping Y, Liu N, Luo S-S (2016) A two-level hybrid approach for intrusion detection. Neurocomputing 214(Supplement C):391\u2013400","journal-title":"Neurocomputing"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12065-019-00199-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-019-00199-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-019-00199-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T19:09:38Z","timestamp":1579806578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12065-019-00199-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,24]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["199"],"URL":"https:\/\/doi.org\/10.1007\/s12065-019-00199-5","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,24]]},"assertion":[{"value":"12 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}