{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:46:40Z","timestamp":1753274800604,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/fuzz-ieee.2018.8491570","type":"proceedings-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T18:18:38Z","timestamp":1539973118000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Inconsistency Measure Associated Discretization Methods to Network-based Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Rong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yanpeng","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Ansheng","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Reyer","family":"Zwiggelaar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"J48 and jrip rules for e-governance data","author":"rajput","year":"2011","journal-title":"Computer Science Journals"},{"key":"ref32","first-page":"75","article-title":"A study of comparative analysis of regression algorithms for reusability evaluation of object oriented based software components","author":"zahara","year":"2014","journal-title":"International Conference on Open Source Systems and Technologies"},{"key":"ref31","first-page":"1","article-title":"Multi-functional nearest-neighbour classification","author":"qu","year":"2017","journal-title":"Soft Computing"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39091-3_25"},{"key":"ref10","first-page":"575","article-title":"Epileptic seizure detection using artificial neural network and a new feature extraction approach based on equal width discretization","volume":"26","author":"orhan","year":"2011","journal-title":"Journal of The Faculty of Engineering and Architecture of Gazi University"},{"article-title":"Clustering-based discretization of numeric attributes","year":"2011","author":"piculin","key":"ref11"},{"key":"ref12","first-page":"1","article-title":"A data mining framework for building intrusion detection models","author":"lee","year":"1999","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"ref13","article-title":"An extended TakagiSugeno Kang inference system (TSK+) with fuzzy interpolation and its rule base generation","author":"li","year":"2017","journal-title":"Soft Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015710"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2017913066"},{"key":"ref17","first-page":"531","article-title":"Dbscan on resilient distributed datasets","author":"cordova","year":"2015","journal-title":"International Conference on High Performance Computing and Simulation"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1488-1"},{"journal-title":"Data Mining and Uncertain Reasoning An Integrated Approach","year":"2001","author":"chen","key":"ref19"},{"key":"ref28","article-title":"Linear programs for measuring inconsistency in probabilistic logics","author":"potyka","year":"2014","journal-title":"KR"},{"key":"ref4","first-page":"123","article-title":"Chimerge: Discretization of numeric attributes","author":"kerber","year":"1992","journal-title":"Proceedings of the Tenth National Conference on Artificial Intelligence"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22152-1_31"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0017012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-2426(199711)13:6<587::AID-NUM1>3.0.CO;2-N"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2016.04.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50032-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.01.017"},{"key":"ref7","first-page":"400","article-title":"A global discretization method based on clustering and rough set","author":"luo","year":"2015","journal-title":"The International Flins Conference"},{"key":"ref2","article-title":"Performance evaluation of data clustering techniques using kdd cup-99 intrusion detection data set","volume":"1","author":"chandrashekhar","year":"2012","journal-title":"International Journal of Information & Network Security"},{"key":"ref9","first-page":"8","article-title":"A continuous optimization algorithm using equal frequency discretization applied to a fictitious play","volume":"36","author":"lee","year":"2013"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/332159.332161"},{"key":"ref20","first-page":"253","article-title":"Unsupervised clustering methods for identifying rare events in anomaly detection","author":"chimphlee","year":"2005"},{"key":"ref22","first-page":"3156","article-title":"Probabilistic reasoning with inconsistent beliefs using inconsistency measures","author":"potyka","year":"2015","journal-title":"IJCAI"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1126\/science.1242072","article-title":"Clustering by fast search and find of density peaks","volume":"344","author":"rodriguez","year":"2014","journal-title":"Science"},{"journal-title":"A Theory of Inconsistency","year":"2002","author":"knight","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2016.01.013"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2015.04.007"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0295-y"}],"event":{"name":"2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2018,7,8]]},"location":"Rio de Janeiro","end":{"date-parts":[[2018,7,13]]}},"container-title":["2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8466242\/8491438\/08491570.pdf?arnumber=8491570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:59:59Z","timestamp":1598223599000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2018.8491570","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}