{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:10:59Z","timestamp":1771697459262,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cec.2003.1299873","type":"proceedings-article","created":{"date-parts":[[2004,7,9]],"date-time":"2004-07-09T05:50:57Z","timestamp":1089352257000},"page":"1669-1675","source":"Crossref","is-referenced-by-count":16,"title":["Weighted feature extraction using a genetic algorithm for intrusion detection"],"prefix":"10.1109","volume":"3","author":[{"given":"M.J.","family":"Middlemiss","sequence":"first","affiliation":[]},{"given":"G.","family":"Dick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"1130","article-title":"Cost-based modeling for fraud and intrusion detection: Results from the JAM project","volume":"11","author":"stolfo","year":"2000","journal-title":"Proc da RPA Lriforniarion Survivabilih Conference Arid Exposirion"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766909"},{"key":"15","year":"0","journal-title":"Kdd Cup 1999 Data Set"},{"key":"16","year":"0","journal-title":"DARPA Intrusion Detection Evaluation"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"14","author":"dasarathy","year":"1991","journal-title":"Nearest Neighbor(NN) Norms Riri Pattern Class$catiori Techniques"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(95)00041-E"},{"key":"12","first-page":"51","article-title":"Using text categorization techniques for intrusion detection","author":"liao","year":"2002","journal-title":"Proc 11th USENIX Security Symp (Security 02)"},{"key":"3","article-title":"Knowledge based neural networks for online and off-line modeling and rule extraction in bioinformatics","author":"kasabov","year":"2001","journal-title":"Proc Atlantic Synposiuni on Computational Biology Genome Lnformation System and Technology"},{"key":"2","article-title":"An introducion to intrusion detection","volume":"2","author":"sundaram","year":"1996","journal-title":"ACM Crossroads -Special Issue on Computer Security"},{"key":"1","first-page":"943","article-title":"Intrusion detection with neural networks","volume":"10","author":"ryan","year":"1998","journal-title":"Advatices in Neural Itfarniation Processing Systems"},{"key":"10","doi-asserted-by":"crossref","first-page":"2121","DOI":"10.1007\/3-540-45110-2_108","article-title":"Genetic algorithm optimized feature transformation A comparison with different classifiers","author":"huang","year":"2003","journal-title":"Genetic Arid Evolutionary Computation - GECCO-2003"},{"key":"7","first-page":"561","article-title":"Simultaneous feature scaling and selection using a masking genetic-algorithm","author":"raymer","year":"1997","journal-title":"Proc 7th Int Conf Genetic Algorithms"},{"key":"6","first-page":"557","article-title":"Further research on feature selection and classification using genetic algorithms","author":"punch","year":"0","journal-title":"Proceedings of the 5th Lnternational Conference on Getietic Algorithms"},{"key":"5","first-page":"450","article-title":"A hybrid genetic algorithm for classification","author":"kelly jr","year":"1991","journal-title":"Proceedings of the 12th Intematiorinl Joint Conference on Artificial Lntelligeiice"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/34.574797"},{"key":"9","first-page":"371","article-title":"Feature extraction using genetic algorithms","author":"pei","year":"1998","journal-title":"Proceedings of the International Symposiun on Intelligent Data Engineering Arid Learning (IDEAL'98)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/4235.850656"}],"event":{"name":"The 2003 Congress on Evolutionary Computation, 2003. CEC '03.","location":"Canberra, Australia"},"container-title":["The 2003 Congress on Evolutionary Computation, 2003. CEC '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9096\/28878\/01299873.pdf?arnumber=1299873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:41:47Z","timestamp":1497588107000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1299873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cec.2003.1299873","relation":{},"subject":[]}}