{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:30:51Z","timestamp":1725424251904},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/cit.2007.99","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:04:05Z","timestamp":1209387845000},"page":"83-86","source":"Crossref","is-referenced-by-count":8,"title":["Comparison of Two Feature Selection Methods in Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"M. J.","family":"Fadaeieslam","sequence":"first","affiliation":[]},{"given":"B.","family":"Minaei-Bidgoli","sequence":"additional","affiliation":[]},{"given":"M.","family":"Fathy","sequence":"additional","affiliation":[]},{"given":"M.","family":"Soryani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/276304.276314"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"10","first-page":"1","author":"burges","year":"1998","journal-title":"A tutorial on Support Vector Machines for pattern recognition"},{"year":"0","key":"1"},{"key":"7","first-page":"209","article-title":"Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context","author":"maheshkumar sabhnani","year":"2003","journal-title":"MLMTA"},{"year":"2006","key":"6"},{"key":"5","article-title":"Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)","author":"amini","year":"2004","journal-title":"Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS 2004)"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/TKDE.2005.136"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/CVPR.1997.609310"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","author":"cover","year":"1991","journal-title":"Elements of Information Theory"},{"year":"2007","key":"11"}],"event":{"name":"7th IEEE International Conference on Computer and Information Technology (CIT 2007)","start":{"date-parts":[[2007,10,16]]},"location":"Aizu-Wakamatsu, Fukushima, Japan","end":{"date-parts":[[2007,10,19]]}},"container-title":["7th IEEE International Conference on Computer and Information Technology (CIT 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4385040\/4385041\/04385061.pdf?arnumber=4385061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:30:18Z","timestamp":1497756618000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4385061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cit.2007.99","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}