{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:15:32Z","timestamp":1771697732914,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3035250","type":"journal-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:13:24Z","timestamp":1604351604000},"page":"199482-199491","source":"Crossref","is-referenced-by-count":6,"title":["Epigenetic Algorithm-Based Detection Technique for Network Attacks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0736-016X","authenticated-orcid":false,"given":"Mehdi","family":"Ezzarii","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2790-4419","authenticated-orcid":false,"given":"Hamid El","family":"Ghazi","sequence":"additional","affiliation":[]},{"given":"Hassan El","family":"Ghazi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8141-6793","authenticated-orcid":false,"given":"Faissal El","family":"Bouanani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.53"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.09.014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060916"},{"key":"ref36","first-page":"251","article-title":"Wavelet neural network model for network intrusion detection system","volume":"11","author":"hamid","year":"2018","journal-title":"Int J Inf Technol"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.13"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00511-X"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.04.101"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2911548"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04103-1"},{"key":"ref20","first-page":"18","article-title":"Feature selection based on information gain","volume":"2","author":"azhagusundari","year":"2013","journal-title":"Int J Innov Technol Exploring Eng"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-73"},{"key":"ref21","first-page":"271","article-title":"Comparative study of attribute selection using gain ratio and correlation based feature selection","volume":"2","author":"karegowda","year":"2010","journal-title":"Int J Inf Technol Knowl Manage"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2013.08.08"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00006-5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2698457"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330580"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1370-6"},{"key":"ref10","first-page":"475","article-title":"Detecting new forms of network intrusion using genetic programming","author":"lu","year":"2003","journal-title":"Proc Congr Evol Comput (CEC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2014.137"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref12","article-title":"GA-NIDS: A genetic algorithm based network intrusion detection system","author":"goyal","year":"2008"},{"key":"ref13","first-page":"233","article-title":"Genetic algorithms in intrusion detection systems: A survey","volume":"5","author":"majeed","year":"2014","journal-title":"Int J Innov Appl Stud"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1869-5"},{"key":"ref15","first-page":"39","article-title":"Epigenetics & genetic algorithms for inverse kinematics","volume":"9","author":"kenwright","year":"2014","journal-title":"Experim Algorithms"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/43657"},{"key":"ref17","article-title":"Computer algorithm uses epigenetics to identify aging genes","author":"kirkpatrick","year":"2014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.008"},{"key":"ref19","article-title":"Correlation-based feature selection for machine learning","author":"mark","year":"1999"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928048"},{"key":"ref3","first-page":"23","article-title":"Intrusion detection systems (IDS) taxonomy-a short review","volume":"13","author":"amer","year":"2010","journal-title":"Defense Cyber Security"},{"key":"ref6","first-page":"2","article-title":"Internet intrusion detection system service in a cloud","volume":"9","author":"zarrabi","year":"2012","journal-title":"Int J Comput Sci"},{"key":"ref5","first-page":"109","article-title":"An implementation of intrusion detection system using genetic algorithm","volume":"4","author":"sazzadul hoque","year":"2012","journal-title":"Int J Netw Security Appl"},{"key":"ref8","first-page":"1","article-title":"Applying genetic programming to intrusion detection","author":"crosbie","year":"1995","journal-title":"Proc AAAI Fall Symp Genetic Program"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01919-x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7086963"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2003.1244366"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100001"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2017.9401"},{"key":"ref48","author":"tollefsbol","year":"2017","journal-title":"Handbook of Epigenetics The New Molecular and Medical Genetics"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.017"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7336990"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3167918.3167951"},{"key":"ref44","first-page":"86","article-title":"Analysis of fitness function in designing genetic algorithm based intrusion detection system","volume":"3","author":"vithalpura","year":"2015","journal-title":"Int J Sci Res Develop"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2014.6918242"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09246497.pdf?arnumber=9246497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:57:48Z","timestamp":1642003068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9246497\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3035250","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}