{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:55:41Z","timestamp":1742802941003},"reference-count":22,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2017,9,3]]},"DOI":"10.1080\/19393555.2017.1358779","type":"journal-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T15:28:31Z","timestamp":1506353311000},"page":"229-239","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":8,"title":["Multivariate correlation coefficient and mutual information-based feature selection in intrusion detection"],"prefix":"10.1080","volume":"26","author":[{"given":"Sara","family":"Mohammadi","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Shahid Bahonar University, Kerman, Iran"}]},{"given":"Hamid","family":"Mirvaziri","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Shahid Bahonar University, Kerman, Iran"}]},{"given":"Mostafa","family":"Ghazizadeh-Ahsaee","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Shahid Bahonar University, Kerman, Iran"}]}],"member":"301","published-online":{"date-parts":[[2017,9,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2519914"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.3103\/S0146411616010028"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/72.298224"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0007-7"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.11.028"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1942-8"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.024"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.009"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1302-53"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.01.010"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1938.tb02189.x"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-012-0139-z"},{"issue":"1","key":"CIT0015","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-1499-2013-1","volume":"2013","author":"Ganapathy S.","year":"2013","journal-title":"EURAS IP Journal on Wireless Communications and Networking"},{"key":"CIT0016","volume-title":"A practical guide to support vector classification","author":"Hsu C. W.","year":"2003"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.028"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.10.002"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289159"},{"issue":"12","key":"CIT0021","first-page":"987","volume":"9","author":"Song J.","year":"2014","journal-title":"Journal of Communications"},{"key":"CIT0022","first-page":"1","volume":"2","author":"Srinivasa S.","year":"2005","journal-title":"University of Notre Dame, Notre Dame, Indiana"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2017.1358779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T15:28:35Z","timestamp":1506353315000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2017.1358779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,3]]},"references-count":22,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,7,18]]},"published-print":{"date-parts":[[2017,9,3]]}},"alternative-id":["10.1080\/19393555.2017.1358779"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2017.1358779","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}