{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T05:19:14Z","timestamp":1740460754331,"version":"3.37.3"},"reference-count":11,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2010,8,11]]},"DOI":"10.1080\/19393551003762215","type":"journal-article","created":{"date-parts":[[2010,8,12]],"date-time":"2010-08-12T16:05:43Z","timestamp":1281629143000},"page":"204-212","source":"Crossref","is-referenced-by-count":1,"title":["Evolving Clusters for Network Intrusion Detection System Using Genetic-X-Means Algorithm"],"prefix":"10.1080","volume":"19","author":[{"given":"Siva S.","family":"Sivatha Sindhu","sequence":"first","affiliation":[]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/1629087.1629089"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"CIT0003","unstructured":"Gomez, J. and Dasgupta, D. Evolving fuzzy classifier for intrusion detection. Proceedings of IEEE Workshop on Information Assurance. June, New York."},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006624031083"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2006.1714200"},{"key":"CIT0006","unstructured":"Moradi, M. and Zulkernine, M. A neural network-based system for intrusion detection and classification of attacks. Proceedings of IEEE International Conference on Advances in Intelligent Systems\u2014Theory and Applications. November, Luxembourg. Vol. 148, pp.1\u20136."},{"volume-title":"X means: Extending K-means with efficient estimation of the number of clusters","year":"2000","author":"Pelleg D.","key":"CIT0007"},{"key":"CIT0008","volume":"39","author":"Singh S.","year":"2009","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics\u2014Part A: Systems and Humans"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-009-0406-y"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Srinoy, S. Intrusion detection model based on particle swarm optimization and support vector machine. IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA. April. pp.186\u2013192.","DOI":"10.1109\/CISDA.2007.368152"},{"key":"CIT0011","unstructured":"Sun, Z.H., Bebis, G.N., Yuan, X.J. and Louis, S.J. Genetic feature subset selection for gender classification: A comparison study. Proceedings of the Sixth IEEE Workshop on Applications of Computer Vision. 2002. pp.165\u2013170."}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393551003762215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T07:21:28Z","timestamp":1740381688000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19393551003762215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,11]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,8,11]]}},"alternative-id":["10.1080\/19393551003762215"],"URL":"https:\/\/doi.org\/10.1080\/19393551003762215","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"type":"print","value":"1939-3555"},{"type":"electronic","value":"1939-3547"}],"subject":[],"published":{"date-parts":[[2010,8,11]]}}}