{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:19:32Z","timestamp":1763810372750,"version":"3.37.3"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Netw."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s42045-020-00040-z","type":"journal-article","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T09:02:58Z","timestamp":1603184578000},"page":"261-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks"],"prefix":"10.1007","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1204-505X","authenticated-orcid":false,"given":"Majd","family":"Latah","sequence":"first","affiliation":[]},{"given":"Levent","family":"Toker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"issue":"2","key":"40_CR1","doi-asserted-by":"publisher","first-page":"601","DOI":"10.2298\/CSIS130415035A","volume":"11","author":"Y Abuadlla","year":"2014","unstructured":"Abuadlla, Y., Kvascev, G., Gajin, S., Jovanovic, Z.: Flow-based anomaly intrusion detection system using two neural network stages. Comput. Sci. Inf. Syst. 11(2), 601\u2013622 (2014)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"40_CR2","unstructured":"Alazab, M., Venkatraman, S., Watters, P., Alazab, M.: Zero-day malware detection based on supervised learning algorithms of api call signatures. In: Proceedings of the Ninth Australasian Data Mining Conference-Volume 121, pp. 171\u2013182. Australian Computer Society, Inc. (2011)"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Al-Nashif, Y., Kumar, A.A., Hariri, S., Luo, Y., Szidarovsky, F., Qu, G.: Multilevel intrusion detection system (ml-ids). In: 2008 International Conference on Autonomic Computing, pp. 131\u2013140. IEEE (2008)","DOI":"10.1109\/ICAC.2008.25"},{"key":"40_CR4","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2016.09.041","volume":"67","author":"WL Al-Yaseen","year":"2017","unstructured":"Al-Yaseen, W.L., Othman, Z.A., Nazri, M.Z.A.: Multi-level hybrid support vector machine and extreme learning machine based on modified k-means for intrusion detection system. Expert Syst. Appl. 67, 296\u2013303 (2017)","journal-title":"Expert Syst. Appl."},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Amoli, P.V., H\u00e4m\u00e4l\u00e4inen, T.: Real time multi stage unsupervised intelligent engine for nids to enhance detection rate of unknown attacks. In: 2013 IEEE Third International Conference on Information Science and Technology (ICIST), pp. 702\u2013706. IEEE (2013)","DOI":"10.1109\/ICIST.2013.6747642"},{"issue":"3","key":"40_CR6","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1016\/j.neuroimage.2003.10.012","volume":"21","author":"P Anbeek","year":"2004","unstructured":"Anbeek, P., Vincken, K.L., Van Osch, M.J., Bisschops, R.H., Van Der Grond, J.: Probabilistic segmentation of white matter lesions in mr imaging. NeuroImage 21(3), 1037\u20131044 (2004)","journal-title":"NeuroImage"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Araki, S., Yamaguchi, Y., Shimada, H., Takakura, H.: Unknown attack detection by multistage one-class svm focusing on communication interval. In: International Conference on Neural Information Processing, pp. 325\u2013332. Springer (2014)","DOI":"10.1007\/978-3-319-12643-2_40"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Aziz, A.S.A., Hassanien, A.E., Hanaf, S.E.O., Tolba, M.F.: Multi-layer hybrid machine learning techniques for anomalies detection and classification approach. In: 13th International Conference on Hybrid Intelligent Systems (HIS 2013), pp. 215\u2013220. IEEE (2013)","DOI":"10.1109\/HIS.2013.6920485"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Banerjee, K.: Generalized inverse of matrices and its applications. (1973)","DOI":"10.1080\/00401706.1973.10489026"},{"issue":"1","key":"40_CR10","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1137\/080716542","volume":"2","author":"A Beck","year":"2009","unstructured":"Beck, A., Teboulle, M.: A fast iterative shrinkage-thresholding algorithm for linear inverse problems. SIAM J. Imaging Sci. 2(1), 183\u2013202 (2009)","journal-title":"SIAM J. Imaging Sci."},{"issue":"3","key":"40_CR11","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.patrec.2011.10.021","volume":"33","author":"G Bhattacharya","year":"2012","unstructured":"Bhattacharya, G., Ghosh, K., Chowdhury, A.S.: An affinity-based new local distance function and similarity measure for knn algorithm. Pattern Recognit. Lett. 33(3), 356\u2013363 (2012)","journal-title":"Pattern Recognit. Lett."},{"key":"40_CR12","unstructured":"Borah, B., Bhattacharyya, D.: Catsub: a technique for clustering categorical data based on subspace. ICFAI J. Comput. Sci. 7\u201320 (2008)"},{"key":"40_CR13","unstructured":"Brauckhoff, D., May, M., Plattner, B.: Flow-level anomaly detection - blessing or curse? In: IEEE INFOCOM 2007, Student Workshop, Anchorage, Alaska, USA (May 2007)"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Casas, P., Mazel, J., Owezarski, P.: Unada: unsupervised network anomaly detection using sub-space outliers ranking. In: International Conference on Research in Networking, pp. 40\u201351. Springer (2011)","DOI":"10.1007\/978-3-642-20757-0_4"},{"key":"40_CR15","unstructured":"Cheng, C., Tay, W.P., Huang, G.: Extreme learning machines for intrusion detection. In: The 2012 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138 (2012)"},{"key":"40_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/S1874-5946(98)80029-1","volume":"5","author":"L Cordella","year":"1998","unstructured":"Cordella, L., Sansone, C., Tortorella, F., Vento, M., De Stefano, C.: Neural network classification reliability: problems and applications. Image Process. Pattern Recognit. 5, 161\u2013200 (1998)","journal-title":"Image Process. Pattern Recognit."},{"issue":"2","key":"40_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10044-006-0053-7","volume":"10","author":"LP Cordella","year":"2007","unstructured":"Cordella, L.P., Sansone, C.: A multi-stage classification system for detecting intrusions in computer networks. Pattern Anal. Appl. 10(2), 83\u2013100 (2007)","journal-title":"Pattern Anal. Appl."},{"issue":"1","key":"40_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/sec.341","volume":"5","author":"D Damopoulos","year":"2012","unstructured":"Damopoulos, D., Menesidou, S.A., Kambourakis, G., Papadaki, M., Clarke, N., Gritzalis, S.: Evaluation of anomaly-based ids for mobile devices using machine learning classifiers. Secur. Commun. Netw. 5(1), 3\u201314 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"40_CR19","unstructured":"Dasarathy, B.V.: Nearest neighbor (nn) norms: Nn pattern classification techniques. IEEE Comput. Soc. Tutor. (1991)"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Dey, S.K., Uddin, M.R., Rahman, M.M.: Detection of flow based anomaly in OpenFlow controller: machine learning approach in software defined networking. In: 2018 4th International Conference on Electrical Engineering and Information & Communication Technology (iCEEiCT), pp. 416\u2013421 (2018).","DOI":"10.1109\/CEEICT.2018.8628105"},{"key":"40_CR21","first-page":"226","volume":"96","author":"M Ester","year":"1996","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. Kdd 96, 226\u2013231 (1996)","journal-title":"Kdd"},{"key":"40_CR22","doi-asserted-by":"crossref","unstructured":"Firte, L., Lemnaru, C., Potolea, R.: Spam detection filter using knn algorithm and resampling. In: Proceedings of the 2010 IEEE 6th International Conference on Intelligent Computer Communication and Processing, pp. 27\u201333. IEEE (2010)","DOI":"10.1109\/ICCP.2010.5606466"},{"issue":"6","key":"40_CR23","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TPAMI.2005.113","volume":"27","author":"AL Fred","year":"2005","unstructured":"Fred, A.L., Jain, A.K.: Combining multiple clusterings using evidence accumulation. IEEE Trans. Pattern Anal. Mach. Intell. 27(6), 835\u2013850 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"40_CR24","unstructured":"Gogoi, P., Borah, B., Bhattacharyya, D.K.: Network anomaly detection using unsupervised model. Int.  J. Comput. Appl. (Special Issue on Network Security and Cryptography) NSC, 19\u201330 (2011)"},{"issue":"4","key":"40_CR25","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxt044","volume":"57","author":"P Gogoi","year":"2013","unstructured":"Gogoi, P., Bhattacharyya, D., Borah, B., Kalita, J.K.: Mlh-ids: a multi-level hybrid intrusion detection method. Comput. J. 57(4), 602\u2013623 (2013)","journal-title":"Comput. J."},{"key":"40_CR26","doi-asserted-by":"crossref","unstructured":"Golling, M., Hofstede, R., Koch, R.: Towards multi-layered intrusion detection in high-speed networks. In: 2014 6th International Conference on Cyber Conflict (CyCon 2014), pp. 191\u2013206. IEEE (2014)","DOI":"10.1109\/CYCON.2014.6916403"},{"issue":"2","key":"40_CR27","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1111\/1467-9868.00338","volume":"64","author":"C Holmes","year":"2002","unstructured":"Holmes, C., Adams, N.: A probabilistic nearest neighbour method for statistical pattern recognition. J. R. Stat. Soc. Ser. B (Statistical Methodology) 64(2), 295\u2013306 (2002)","journal-title":"J. R. Stat. Soc. Ser. B (Statistical Methodology)"},{"key":"40_CR28","first-page":"985","volume":"2","author":"GB Huang","year":"2004","unstructured":"Huang, G.B., Zhu, Q.Y., Siew, C.K., et al.: Extreme learning machine: a new learning scheme of feedforward neural networks. Neural Netw. 2, 985\u2013990 (2004)","journal-title":"Neural Netw."},{"issue":"2","key":"40_CR29","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","volume":"2","author":"GB Huang","year":"2011","unstructured":"Huang, G.B., Wang, D.H., Lan, Y.: Extreme learning machines: a survey. Int. J. Mach. Learn. Cybern. 2(2), 107\u2013122 (2011)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"5","key":"40_CR30","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1080\/18756891.2016.1237186","volume":"9","author":"J Hussain","year":"2016","unstructured":"Hussain, J., Lalmuanawma, S., Chhakchhuak, L.: A two-stage hybrid classification technique for network intrusion detection system. Int. J.Comput. Intell. Syst. 9(5), 863\u2013875 (2016)","journal-title":"Int. J.Comput. Intell. Syst."},{"issue":"4","key":"40_CR31","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/COMST.2014.2320094","volume":"16","author":"Y Jarraya","year":"2014","unstructured":"Jarraya, Y., Madi, T., Debbabi, M.: A survey and a layered taxonomy of software-defined networking. IEEE Commun. Surveys Tutor. 16(4), 1955\u20131980 (2014)","journal-title":"IEEE Commun. Surveys Tutor."},{"key":"40_CR32","doi-asserted-by":"crossref","unstructured":"Jin, W., Tung, A.K., Han, J., Wang, W.: Ranking outliers using symmetric neighborhood relationship. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 577\u2013593. Springer (2006)","DOI":"10.1007\/11731139_68"},{"key":"40_CR33","unstructured":"Kim, M.S., Kong, H.J., Hong, S.C., Chung, S.H., Hong, J.W.: A flow-based method for abnormal network traffic detection. In: 2004 IEEE\/IFIP network operations and management symposium (IEEE Cat. No. 04CH37507), vol. 1, pp. 599\u2013612. IEEE (2004)"},{"key":"40_CR34","unstructured":"Koch, R.: Towards next-generation intrusion detection. In: 2011 3rd International Conference on Cyber Conflict, pp. 1\u201318. IEEE (2011)"},{"key":"40_CR35","doi-asserted-by":"crossref","unstructured":"Kuang, L., Zulkernine, M.: An anomaly intrusion detection method using the csi-knn algorithm. In: Proceedings of the 2008 ACM symposium on Applied computing, pp. 921\u2013926. ACM (2008)","DOI":"10.1145\/1363686.1363897"},{"key":"40_CR36","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM SIGCOMM Computer Communication Review, vol. 35, pp. 217\u2013228. ACM (2005)","DOI":"10.1145\/1090191.1080118"},{"issue":"2","key":"40_CR37","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1049\/iet-net.2018.5082","volume":"8","author":"M Latah","year":"2018","unstructured":"Latah, M., Toker, L.: Artificial intelligence enabled software-defined networking: a comprehensive overview. IET Netw. 8(2), 79\u201399 (2018a)","journal-title":"IET Netw."},{"issue":"6","key":"40_CR38","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1049\/iet-net.2018.5080","volume":"7","author":"M Latah","year":"2018","unstructured":"Latah, M., Toker, L.: Towards an efficient anomaly-based intrusion detection for software-defined networks. IET Netw. 7(6), 453\u2013459 (2018b)","journal-title":"IET Netw."},{"key":"40_CR39","doi-asserted-by":"crossref","unstructured":"Lee, D.H., Kim, D.Y., Jung, J.I.: Multi-stage intrusion detection system using hidden markov model algorithm. In: 2008 International Conference on Information Science and Security (ICISS 2008), pp. 72\u201377. IEEE (2008)","DOI":"10.1109\/ICISS.2008.22"},{"issue":"7\u20138","key":"40_CR40","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.cose.2007.10.002","volume":"26","author":"Y Li","year":"2007","unstructured":"Li, Y., Guo, L.: An active learning based tcm-knn algorithm for supervised network intrusion detection. Comput. Secur. 26(7\u20138), 459\u2013467 (2007)","journal-title":"Comput. Secur."},{"key":"40_CR41","doi-asserted-by":"crossref","unstructured":"Li, W., Yi, P., Wu, Y., Pan, L., Li, J.: A new intrusion detection system based on knn classification algorithm in wireless sensor network. J. Electr. Comput. Eng. (2014)","DOI":"10.1155\/2014\/240217"},{"issue":"5","key":"40_CR42","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur. 21(5), 439\u2013448 (2002a)","journal-title":"Comput. Secur."},{"key":"40_CR43","first-page":"51","volume":"12","author":"Y Liao","year":"2002","unstructured":"Liao, Y., Vemuri, V.R.: Using text categorization techniques for intrusion detection. USENIX Secur. Symp. 12, 51\u201359 (2002b)","journal-title":"USENIX Secur. Symp."},{"issue":"2","key":"40_CR44","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"1","key":"40_CR45","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/1007730.1007731","volume":"6","author":"L Parsons","year":"2004","unstructured":"Parsons, L., Haque, E., Liu, H.: Subspace clustering for high dimensional data: a review. ACM SIGKDD Explor. Newsl 6(1), 90\u2013105 (2004)","journal-title":"ACM SIGKDD Explor. Newsl"},{"key":"40_CR46","doi-asserted-by":"crossref","unstructured":"Parvin, H.; Alizadeh, H.; Minaes-Bidgoli, B.: MKNN: modified k-nearest neighbor. In: Proceedings of World Congress on Engineering and Computer Science (WCECS), Yantai, China, pp. 91\u201394 (2010)","DOI":"10.1063\/1.3146187"},{"key":"40_CR47","doi-asserted-by":"crossref","unstructured":"Popescu, M., Keller, J.M.: Random projections fuzzy k-nearest neighbor (rpfknn) for big data classification. In: 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1813\u20131817. IEEE (2016)","DOI":"10.1109\/FUZZ-IEEE.2016.7737910"},{"key":"40_CR48","doi-asserted-by":"crossref","unstructured":"Rajeswari, L.P., Kannan, A.: An intrusion detection system based on multiple level hybrid classifier using enhanced c4. 5. In: 2008 International Conference on Signal Processing, Communications and Networking, pp. 75\u201379. IEEE (2008)","DOI":"10.1109\/ICSCN.2008.4447164"},{"key":"40_CR49","unstructured":"Reddy, N.S., Acharya, U.D., et al.: A two-stage hybrid model for intrusion detection. In: 2006 International Conference on Advanced Computing and Communications, pp. 163\u2013165. IEEE (2006)"},{"issue":"9","key":"40_CR50","first-page":"317","volume":"2","author":"I Santos","year":"2009","unstructured":"Santos, I., Penya, Y.K., Devesa, J., Bringas, P.G.: N-grams-based file signatures for malware detection. ICEIS 2(9), 317\u2013320 (2009)","journal-title":"ICEIS"},{"key":"40_CR51","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1016\/j.protcy.2012.10.111","volume":"6","author":"N Sharma","year":"2012","unstructured":"Sharma, N., Mukherjee, S.: A novel multi-classifier layered approach to improve minority attack detection in ids. Proc. Technol. 6, 913\u2013921 (2012)","journal-title":"Proc. Technol."},{"issue":"22","key":"40_CR52","doi-asserted-by":"publisher","first-page":"8609","DOI":"10.1016\/j.eswa.2015.07.015","volume":"42","author":"R Singh","year":"2015","unstructured":"Singh, R., Kumar, H., Singla, R.: An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl. 42(22), 8609\u20138624 (2015)","journal-title":"Expert Syst. Appl."},{"key":"40_CR53","doi-asserted-by":"crossref","unstructured":"Sperotto, A., Pras, A.: Flow-based intrusion detection. In: 12th IFIP\/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, pp. 958\u2013963. IEEE (2011)","DOI":"10.1109\/INM.2011.5990529"},{"issue":"3","key":"40_CR54","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An overview of ip flow-based intrusion detection. IEEE Commun. Surveys Tutor. 12(3), 343\u2013356 (2010)","journal-title":"IEEE Commun. Surveys Tutor."},{"issue":"4","key":"40_CR55","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TNNLS.2015.2424995","volume":"27","author":"J Tang","year":"2015","unstructured":"Tang, J., Deng, C., Huang, G.B.: Extreme learning machine for multilayer perceptron. IEEE Trans. Neural Netw. Learn. Syst. 27(4), 809\u2013821 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"40_CR56","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep learning approach for network intrusion detection in software defined networking. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 258\u2013263. IEEE (2016)","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"40_CR57","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., Ghogho, M.: Deep recurrent neural network for intrusion detection in sdn-based networks. In 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), pp. 202\u2013206. IEEE (2018)","DOI":"10.1109\/NETSOFT.2018.8460090"},{"key":"40_CR58","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"40_CR59","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.cose.2017.05.009","volume":"70","author":"MF Umer","year":"2017","unstructured":"Umer, M.F., Sher, M., Bi, Y.: Flow-based intrusion detection: TEchniques and challenges. Comput. Secur. 70, 238\u2013254 (2017)","journal-title":"Comput. Secur."},{"key":"40_CR60","doi-asserted-by":"crossref","unstructured":"Wang, B., Sun, Y., Yuan, C., Xu, X.: LESLA: A smart solution for SDN-enabled mMTC E-health monitoring system. In Proceedings of the 8th ACM MobiHoc 2018 Workshop on Pervasive Wireless Healthcare Workshop, pp. 1\u20136. IEEE (2018)","DOI":"10.1145\/3220127.3220128"},{"key":"40_CR61","unstructured":"Wettschereck, D., Dietterich, T.G.: Locally adaptive nearest neighbor algorithms. In: Advances in Neural Information Processing Systems, pp. 184\u2013191 (1994)"},{"key":"40_CR62","unstructured":"Xiang, C., Chong, M., Zhu, H.: Design of mnitiple-level tree classifiers for intrusion detection system. In: IEEE Conference on Cybernetics and Intelligent Systems, 2004., vol. 2, pp. 873\u2013878. IEEE (2004)"}],"container-title":["CCF Transactions on Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-020-00040-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42045-020-00040-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42045-020-00040-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T10:18:01Z","timestamp":1634725081000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42045-020-00040-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":62,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["40"],"URL":"https:\/\/doi.org\/10.1007\/s42045-020-00040-z","relation":{},"ISSN":["2520-8462","2520-8470"],"issn-type":[{"type":"print","value":"2520-8462"},{"type":"electronic","value":"2520-8470"}],"subject":[],"published":{"date-parts":[[2020,10,20]]},"assertion":[{"value":"28 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}