{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:12:48Z","timestamp":1761401568720,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/cec.2011.5949682","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T16:51:24Z","timestamp":1311180684000},"page":"662-668","source":"Crossref","is-referenced-by-count":19,"title":["Binary PSO and random forests algorithm for PROBE attacks detection in a network"],"prefix":"10.1109","author":[{"given":"Arif Jamal","family":"Malik","sequence":"first","affiliation":[]},{"given":"Waseem","family":"Shahzad","sequence":"additional","affiliation":[]},{"given":"Farrukh Aslam","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2009.1948.1959"},{"key":"ref11","article-title":"Feature Selection for Effective Anomaly-Based Intrusion Detection","volume":"9","author":"ghali","year":"2009","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11427469_71"},{"key":"ref13","first-page":"196","article-title":"Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms","author":"chou","year":"2007","journal-title":"International Journal Of Computational Intelligence"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","article-title":"Feature Deduction and Ensemble Design of Intrusion Detection Systems","volume":"24","author":"srilatha","year":"2005","journal-title":"Computers & Security"},{"key":"ref15","first-page":"20","article-title":"Soft Computing Models for Network Intrusion Detection Systems","author":"abraham","year":"2004","journal-title":"Soft Computing in Knowledge Discovery Methods and Applications"},{"journal-title":"PSO overview","year":"0","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"year":"0","key":"ref18"},{"key":"ref19","article-title":"Feature Selection using PSO-SVM","volume":"33","author":"tu","year":"2007","journal-title":"IAENG International Journal of Computer Science"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1109\/FTDCS.2004.1316613","article-title":"A Fuzzy Data Mining Based Intrusion Detection System","author":"jin","year":"2004","journal-title":"Proceedings of 10th International Workshop on future Trends in Distributed Computing Systems (FTDCS04) IEEE Computer Society"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604268"},{"key":"ref6","first-page":"417","article-title":"Robust Prediction of Fault-Proneness by Random Forests","author":"guo","year":"2004","journal-title":"Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04)"},{"journal-title":"KDD'99 datasets The UCI KDD Archive","year":"1999","key":"ref5"},{"key":"ref8","article-title":"An Analysis of the 1999 DARPA\/Lincoln Laboratory Evaluation Data for Network Anomaly Detection","author":"mahoney","year":"2003","journal-title":"Proceeding of Recent Advances in Intrusion Detection (RAID)-2003"},{"key":"ref7","first-page":"131","article-title":"Chaotic Binary Particle Swarm Optimization for Feature Selection using Logistic Map","author":"chuang","year":"2008","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists (IMECS 2008)"},{"key":"ref2","article-title":"IDDM: Intrusion Detection Using Data Mining Techniques","author":"abraham","year":"2001","journal-title":"Technical Report DSTO-GD-0286 DSTO Electronics and Surveillance Research Laboratory"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126610006244"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIME.2009.68"},{"year":"0","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.843274"}],"event":{"name":"2011 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2011,6,5]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2011,6,8]]}},"container-title":["2011 IEEE Congress of Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5936494\/5949581\/05949682.pdf?arnumber=5949682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,21]],"date-time":"2020-06-21T09:11:43Z","timestamp":1592730703000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949682\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cec.2011.5949682","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}