{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:57:42Z","timestamp":1773521862963,"version":"3.50.1"},"reference-count":33,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T00:00:00Z","timestamp":1509408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxx101","type":"journal-article","created":{"date-parts":[[2017,10,10]],"date-time":"2017-10-10T19:22:03Z","timestamp":1507663323000},"page":"526-538","source":"Crossref","is-referenced-by-count":59,"title":["An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection"],"prefix":"10.1093","volume":"61","author":[{"given":"Yanping","family":"Shen","sequence":"first","affiliation":[{"name":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"},{"name":"Department of Disaster Information Engineering, Institute of Disaster Prevention, Beijing, China"}]},{"given":"Kangfeng","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Chunhua","family":"Wu","sequence":"additional","affiliation":[{"name":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computers, Hubei University of Technology, Wuhan, China"}]},{"given":"Xinxin","family":"Niu","sequence":"additional","affiliation":[{"name":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[{"name":"School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"286","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"key\n\t\t\t\t20180329074328_bxx101C1","volume-title":"Development Report on China\u2019s New Media","author":"Fang","year":"2017"},{"key":"key\n\t\t\t\t20180329074328_bxx101C2","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1109\/34.709601","article-title":"The random subspace method for constructing decision forests","volume":"20","author":"Ho","year":"1998","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"key\n\t\t\t\t20180329074328_bxx101C3","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.ins.2011.09.015","article-title":"Voting based extreme learning machine","volume":"185","author":"Cao","year":"2012","journal-title":"Inf. Sci. (Ny)."},{"key":"key\n\t\t\t\t20180329074328_bxx101C4","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/S0004-3702(02)00190-X","article-title":"Ensembling neural networks: many could be better than all","volume":"137","author":"Zhou","year":"2002","journal-title":"Artif. Intell."},{"key":"key\n\t\t\t\t20180329074328_bxx101C5","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1016\/j.neucom.2015.04.105","article-title":"Parallel ensemble of online sequential extreme learning machine based on MapReduce","volume":"174","author":"Huang","year":"2016","journal-title":"Neurocomputing"},{"key":"key\n\t\t\t\t20180329074328_bxx101C6","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.patcog.2011.06.014","article-title":"Adaptive ROC-based ensembles of hmms applied to anomaly detection","volume":"45","author":"Khreich","year":"2012","journal-title":"Pattern. Recognit."},{"key":"key\n\t\t\t\t20180329074328_bxx101C7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.011","article-title":"Ensemble based collaborative and distributed intrusion detection systems: a survey","volume":"66","author":"Folino","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"key\n\t\t\t\t20180329074328_bxx101C8","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TCYB.2013.2281820","article-title":"Feature selection inspired classifier ensemble reduction","volume":"44","author":"Diao","year":"2013","journal-title":"IEEE Trans. Cybern."},{"key":"key\n\t\t\t\t20180329074328_bxx101C9","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1108\/02644401211235834","article-title":"Bat Algorithm: a novel approach for global engineering optimization","volume":"29","author":"Yang","year":"2012","journal-title":"Eng. Comput."},{"key":"key\n\t\t\t\t20180329074328_bxx101C10","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","article-title":"Random-forests based network intrusion detection systems","volume":"38","author":"Zhang","year":"2008","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"key":"key\n\t\t\t\t20180329074328_bxx101C11","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/TPAMI.2006.211","article-title":"Rotation Forest: a new classifier ensemble method","volume":"28","author":"Xia","year":"2006","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"key\n\t\t\t\t20180329074328_bxx101C12","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","article-title":"A novel SVM-kNN-PSO ensemble method for intrusion detection system","volume":"38","author":"Aburomman","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"key\n\t\t\t\t20180329074328_bxx101C13","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.comcom.2012.09.010","article-title":"Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems","volume":"36","author":"Kumar","year":"2013","journal-title":"Comput. Commun."},{"key":"key\n\t\t\t\t20180329074328_bxx101C14","doi-asserted-by":"crossref","first-page":"4062","DOI":"10.1016\/j.eswa.2014.12.040","article-title":"MARK-ELM: application of a novel multiple kernel learning framework for improving the robustness of network intrusion detection","volume":"42","author":"Fossaceca","year":"2015","journal-title":"Expert Syst. Appl."},{"key":"key\n\t\t\t\t20180329074328_bxx101C15","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1016\/S0167-8655(03)00004-7","article-title":"Fusion of multiple classifiers for intrusion detection in computer networks","volume":"24","author":"Giorgio","year":"2003","journal-title":"Pattern Recognit. Lett."},{"key":"key\n\t\t\t\t20180329074328_bxx101C16","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","article-title":"Extreme learning machine: theory and applications","volume":"70","author":"Huang","year":"2006","journal-title":"Neurocomputing"},{"key":"key\n\t\t\t\t20180329074328_bxx101C17","author":"Nakamura","year":"2012"},{"key":"key\n\t\t\t\t20180329074328_bxx101C18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.inffus.2013.04.006","article-title":"A survey of multiple classifier systems as hybrid","volume":"16","author":"Wozniak","year":"2014","journal-title":"Inf. Fusion"},{"key":"key\n\t\t\t\t20180329074328_bxx101C19","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.inffus.2015.07.003","article-title":"Diversity-aware classifier ensemble selection via f-score","volume":"28","author":"Bisentini","year":"2016","journal-title":"Inf. Fusion"},{"key":"key\n\t\t\t\t20180329074328_bxx101C20","author":"Archibe","year":"1999"},{"key":"key\n\t\t\t\t20180329074328_bxx101C21","author":"Archibe","year":"2006"},{"key":"key\n\t\t\t\t20180329074328_bxx101C22","author":"KyotoUniversity","year":"2006"},{"key":"key\n\t\t\t\t20180329074328_bxx101C23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/s40537-015-0013-4","article-title":"Intrusion detection and big heterogeneous data: a survey","volume":"2","author":"Zuech","year":"2015","journal-title":"J. Big Data"},{"key":"key\n\t\t\t\t20180329074328_bxx101C24","author":"Tavallaee","year":"2009"},{"key":"key\n\t\t\t\t20180329074328_bxx101C25","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.ins.2014.09.025","article-title":"A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks","volume":"294","author":"Costa","year":"2015","journal-title":"Inf. Sci. (Ny)."},{"key":"key\n\t\t\t\t20180329074328_bxx101C26","author":"Belhadj-Aissa","year":"2016"},{"key":"key\n\t\t\t\t20180329074328_bxx101C27","article-title":"Intrusion detection model using fusion of chi-square feature selection and multi class SVM","author":"Thaseen","year":"2016","journal-title":"J. King Saud Univ.: Comput. Inf. Sci."},{"key":"key\n\t\t\t\t20180329074328_bxx101C28","doi-asserted-by":"crossref","first-page":"1650001","DOI":"10.1142\/S0218539316500017","article-title":"Evaluating feature selection methods for network intrusion detection with Kyoto data","volume":"23","author":"Najafabadi","year":"2016","journal-title":"Int. J. Reliability Qual. Saf. Eng."},{"key":"key\n\t\t\t\t20180329074328_bxx101C29","author":"Song","year":"2009"},{"key":"key\n\t\t\t\t20180329074328_bxx101C30","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.protcy.2012.05.017","article-title":"Intrusion detection using naive Bayes classifier with feature reduction","volume":"4","author":"Mukherjee","year":"2012","journal-title":"Procedia Technol."},{"key":"key\n\t\t\t\t20180329074328_bxx101C31","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1016\/j.jnca.2011.01.002","article-title":"Mutual information-based feature selection for intrusion detection systems","volume":"34","author":"Amiri","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"key":"key\n\t\t\t\t20180329074328_bxx101C32","author":"Chi","year":"2012"},{"key":"key\n\t\t\t\t20180329074328_bxx101C33","author":"Nguyen","year":"2008"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/526\/24509671\/bxx101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T11:43:39Z","timestamp":1522323819000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/526\/4582946"}},"subtitle":[],"editor":[{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,10,31]]},"references-count":33,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,10,31]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx101","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2017,10,31]]}}}