{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:04:59Z","timestamp":1775322299608,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/aiccsa.2015.7507112","type":"proceedings-article","created":{"date-parts":[[2016,8,8]],"date-time":"2016-08-08T16:27:50Z","timestamp":1470673670000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["Intrusion detection based on Neuro-Fuzzy classification"],"prefix":"10.1109","author":[{"given":"Imen","family":"Gaied","sequence":"first","affiliation":[]},{"given":"Farah","family":"Jemili","sequence":"additional","affiliation":[]},{"given":"Ouajdi","family":"Korbaa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Approches bas&#x00E9;es sur les r&#x00E9;seaux Bay&#x00E9;siens pour la pr&#x00E9;diction d'attaques s&#x00E9;v&#x00E8;res","author":"taiba","year":"2010","journal-title":"5&#x00E8;mes Journ&#x00E9;es Francophones sur les R&#x00E9;seaux Bay&#x00E9;siens (JFRB2010)"},{"key":"ref11","article-title":"R&#x00E9;seaux Bay&#x00E9;siens na&#x00EF;fs pour la d&#x00E9;tection des attaques coordonn&#x00E9;es","author":"benferhat","year":"2008","journal-title":"Journ&#x00E9;es Francophone sur les R&#x00E9;seaux Bay&#x00E9;siens"},{"key":"ref12","first-page":"27","article-title":"Adaptative Neuro-Fuzzy Inference System for anomaly-based intrusion detection","volume":"2","author":"raut","year":"2014","journal-title":"International Journal of Research in Engineering and Applied Sciences"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2013.6559603"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2014.7.2.06"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(98)00070-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/315891.316068"},{"key":"ref17","article-title":"Neuro-Fuzzy and soft computing","author":"jang","year":"1996"},{"key":"ref18","article-title":"KDD Cup 1999 Intrusion detection dataset","year":"0","journal-title":"The UCI KDD Archive Information and Computer Science University of California"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2006.735.739"},{"key":"ref4","first-page":"101","article-title":"Network Intrusion Detection System Using Fuzzy Logic","volume":"2","author":"shanmugavadivu","year":"2011","journal-title":"Indian Journal of Computer Science and Engineering (IJCSE)"},{"key":"ref3","first-page":"14","article-title":"Network Intrusion Detection Using Clustering: A Data Mining Approach","volume":"30","author":"sathyabama","year":"2011","journal-title":"International Journal of Computer Application (0975&#x2013;8887)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCI.2006.5276608"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213257"},{"key":"ref8","first-page":"221","article-title":"Immunological Approach for Intrusion Detection","volume":"17","author":"zekri","year":"2014","journal-title":"ARIMA Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4208"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/775094.775101"},{"key":"ref9","first-page":"112","article-title":"An Intrusion Detection System Based on KDD-99 Data using Data Mining Techniques and Feature Selection","volume":"4","author":"soni","year":"2014","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"ref20","article-title":"Intrusion Detection based on Hybrid Propagation in Bayesian Networks","author":"jemili","year":"2009","journal-title":"Proceedings of the IEEE International Conference on Intelligence and Security Informatics"},{"key":"ref22","first-page":"1","article-title":"A Detailed Analysis of the KDD CUP 99 Data Set","author":"mahbod","year":"2009","journal-title":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications CISDA"},{"key":"ref21","first-page":"86","article-title":"Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic","volume":"13","author":"wei","year":"2008","journal-title":"2008 The Third International Conference on Internet Monitoring and Protection ICIMP"},{"key":"ref24","article-title":"Foundations of Neuro-Fuzzy Systems","author":"nauck","year":"1997","journal-title":"A book"},{"key":"ref23","first-page":"2663","article-title":"Evaluation of Different Data Mining Algorithms with KDD CUP 99 Data Set","volume":"21","author":"al-mamory","year":"2013","journal-title":"Journal of Babylon University\/Pure and Applied Sciences"}],"event":{"name":"2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA)","location":"Marrakech, Morocco","start":{"date-parts":[[2015,11,17]]},"end":{"date-parts":[[2015,11,20]]}},"container-title":["2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7502233\/7507087\/07507112.pdf?arnumber=7507112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T12:44:37Z","timestamp":1489754677000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7507112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2015.7507112","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}