{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:11:17Z","timestamp":1772907077997,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/his.2012.6421346","type":"proceedings-article","created":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T12:23:14Z","timestamp":1359634994000},"page":"271-277","source":"Crossref","is-referenced-by-count":25,"title":["Adaptive Intrusion Detection System via online machine learning"],"prefix":"10.1109","author":[{"given":"Hai Thanh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Franke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"25","article-title":"The supervised learning no-free-lunch theorems","author":"wolpert","year":"2001","journal-title":"Proc 6th Online World Conference on Soft Computing in Industrial Applications"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"15","doi-asserted-by":"crossref","first-page":"403","DOI":"10.3233\/IDA-2004-8406","article-title":"Why machine learning algorithms fail in misuse detection on kdd intrusion detection data set","volume":"8","author":"sabhnani","year":"2004","journal-title":"Intell Data Anal"},{"key":"16","first-page":"735","article-title":"Online boosting based intrusion detection in changing environments","author":"wang","year":"2008","journal-title":"Proceedings of the 2008 International Conference on Artificial Intelligence ICA\/2008"},{"key":"13","first-page":"47","article-title":"Web analyzing traffic challenge: Description and results","author":"raissi","year":"2007","journal-title":"Proceedings of the ECMUPKDD 2007 Discovery Challenge"},{"key":"14","first-page":"229","article-title":"Snort lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"LISA"},{"key":"11","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/978-3-642-21323-6_4","article-title":"Application of the generic feature selection measure in detection of web attacks","author":"nguyen","year":"2011","journal-title":"T He 4th International Conference Computational Intelligence in Security for Information Systems"},{"key":"12","article-title":"Online ensemble learning","author":"oza","year":"2000","journal-title":"Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on on Innovative Applications of Artificial Intelligence"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78981-9_5"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/258128.258179"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44581-1_3"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8098"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766909"},{"key":"6","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1023\/A:1007424614876","article-title":"Tracking the best expert","volume":"32","author":"herbster","year":"1998","journal-title":"Machine Learning"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"4","author":"duda","year":"2001","journal-title":"Pattern Classification (2nd Edition)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1009"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006624031083"}],"event":{"name":"2012 12th International Conference on Hybrid Intelligent Systems (HIS)","location":"Pune, India","start":{"date-parts":[[2012,12,4]]},"end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 12th International Conference on Hybrid Intelligent Systems (HIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6409521\/6421298\/06421346.pdf?arnumber=6421346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T23:00:26Z","timestamp":1562626826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6421346\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/his.2012.6421346","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}