{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:12:20Z","timestamp":1752228740397,"version":"3.28.0"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03308-z","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T10:06:14Z","timestamp":1730109974000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Comprehensive Classification Approach by Integrating Principal Component Analysis and Support Vector Machines for Advanced Intrusion Detection Systems"],"prefix":"10.1007","volume":"5","author":[{"given":"C.","family":"Pavithra","sequence":"first","affiliation":[]},{"given":"M.","family":"Saradha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"issue":"1","key":"3308_CR1","first-page":"1135","volume":"32","author":"P Borah","year":"2020","unstructured":"Borah P, Gupta D. Functional iterative approaches for solving support vector classification problems based on generalized Huber loss. Neural Comput Appl. 2020;32(1):1135\u20139.","journal-title":"Neural Comput Appl"},{"key":"3308_CR2","first-page":"1362","volume":"10","author":"K Prasanna","year":"2020","unstructured":"Prasanna K. A CNN-LSTM Model for Intrusion Detection System from High Dimensional Data. J Inform Comput Sci. 2020;10:1362\u201370.","journal-title":"J Inform Comput Sci"},{"key":"3308_CR3","doi-asserted-by":"crossref","unstructured":"Cervantes J, Lamont FG. A comprehensive survey on support vector machine classification: Applications, challenges and trends. Neurocomputing. 30 September 2020;408:189\u2013215.","DOI":"10.1016\/j.neucom.2019.10.118"},{"issue":"3","key":"3308_CR4","doi-asserted-by":"publisher","first-page":"527","DOI":"10.3390\/jcp2030027","volume":"2","author":"Mostofa Ahsan","year":"2022","unstructured":"Mostofa Ahsan, Kendall E, Nyagard. Cybersecurity threats and their mitigation approaches using machine Learning- A review. J Cybersecur Priv J Cybersecur Priv. 2022;2(3):527\u201355.","journal-title":"J Cybersecur Priv J Cybersecur Priv"},{"key":"3308_CR5","doi-asserted-by":"crossref","unstructured":"Muhammed Zekeriya Gunduz and Resul Das. Cyber security on smart grid: threats and potential solutions. Comput Networks Volume. March 2020;169:107094.","DOI":"10.1016\/j.comnet.2019.107094"},{"key":"#cr-split#-3308_CR6.1","doi-asserted-by":"crossref","unstructured":"Radivilova T, Kirichenko L, Alghawli AS, Ilkov A, Tawalbeh M, Zinchenko P. The complex method of intrusion detection based on anomaly detection and misuse detection. In Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kyiv, Ukraine, 14-18 May 2020","DOI":"10.1109\/DESSERT50317.2020.9125051"},{"key":"#cr-split#-3308_CR6.2","unstructured":"IEEE: Piscataway, NJ, USA, 2020:133-137."},{"issue":"2","key":"3308_CR7","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/s10462-017-9611-1","volume":"52","author":"J Nalepa","year":"2019","unstructured":"Nalepa J, Kawulok M. Selecting training sets for support vector machines: a review. Artif Intell Rev. 2019;52(2):857\u2013900.","journal-title":"Artif Intell Rev"},{"key":"3308_CR8","unstructured":"Chadia EL, Btissam, Benchaji. A robust intrusion detection system based on a shallow learning model and feature extraction techniques. PLoS ONE. January 24, 2024."},{"key":"3308_CR9","first-page":"44","volume":"10","author":"K Rajasekaran","year":"2020","unstructured":"Rajasekaran K. Classification and importance of intrusion detection system. Int J Comput Sci Inform Secur. 2020;10:44.","journal-title":"Int J Comput Sci Inform Secur"},{"key":"3308_CR10","doi-asserted-by":"publisher","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","volume":"6","author":"Y Xin","year":"2018","unstructured":"Xin Y, Kong L, Liu Z, Chen Y, Li Y, Zhu H, Gao M, Hou H, Wang C. Machine learning and deep learning methods for cybersecurity. IEEE Access. 2018;6:35365\u201381.","journal-title":"IEEE Access"},{"key":"3308_CR11","doi-asserted-by":"crossref","unstructured":"Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep Learning Approach for Intelligent Intrusion Detection System, in IEEE Access. 2019;7:41525\u201341550.","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"3308_CR12","doi-asserted-by":"crossref","unstructured":"Cai Jie L, Jiawei W, Shulin Y, Sheng. Feature selection in machine learning: a new perspective. Neurocomputing. 2018;300:70\u201379, ISSN 0925\u20132312.","DOI":"10.1016\/j.neucom.2017.11.077"},{"issue":"10","key":"3308_CR13","first-page":"1","volume":"41","author":"T Singh","year":"2016","unstructured":"Singh T, Di Troia F, Aaron Visaggio C. Support vector machines and malware detection. J Comput Virol Hacking Techniques. 2016;41(10):1\u201310.","journal-title":"J Comput Virol Hacking Techniques"},{"issue":"36","key":"3308_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2017\/v10i36\/119182","volume":"10","author":"M Ahmer","year":"2017","unstructured":"Ahmer M, Shah A, Zafi SM, Shah S, et al. Using non-linear support vector machines for detection of activities of daily living. Indian J Sci Technol. 2017;10(36):1\u20138.","journal-title":"Indian J Sci Technol"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03308-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03308-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03308-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T10:14:56Z","timestamp":1730110496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03308-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":15,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["3308"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03308-z","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"7 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"996"}}