{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:16Z","timestamp":1767339916017,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/his.2013.6920485","type":"proceedings-article","created":{"date-parts":[[2014,10,15]],"date-time":"2014-10-15T14:35:22Z","timestamp":1413383722000},"page":"215-220","source":"Crossref","is-referenced-by-count":21,"title":["Multi-layer hybrid machine learning techniques for anomalies detection and classification approach"],"prefix":"10.1109","author":[{"given":"Amira Sayed A.","family":"Aziz","sequence":"first","affiliation":[]},{"given":"Aboul Ella","family":"Hassanien","sequence":"additional","affiliation":[]},{"given":"Sanaa El-Ola","family":"Hanaf","sequence":"additional","affiliation":[]},{"given":"M.F.","family":"Tolba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2011.6024887"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.009"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"15","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1049\/cp:19971192","article-title":"recent developments in evolutionary and genetic algorithms: theory and applications","author":"chaiyaratana","year":"1997","journal-title":"Proceedings of Genetic Algorithms in Engineering Systems"},{"key":"16","first-page":"3","article-title":"The optimality of naive bayes","volume":"1","author":"zhang","year":"2004","journal-title":"Proceedings of the FLAIRS Conference"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiolchem.2013.04.007"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2003.1299634"},{"journal-title":"A Tutorial on Principal Components Analysis","year":"2002","author":"lindsay","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022602019183"},{"key":"21","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-3-540-45248-5_10","article-title":"Using decision trees to improve signature-based intrusion detection LATEX","author":"krugel","year":"2003","journal-title":"Recent Advances in Intrusion Detection"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0889-2"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"22"},{"key":"23","first-page":"347","volume":"36","author":"aziz","year":"2012","journal-title":"Artificial Immune System Inspired Intrusion Detection System Using Genetic Algorithm"},{"journal-title":"NSL-KDD Intrusion Detection Data Set","year":"2009","key":"24"},{"journal-title":"KDD Cup?99 Intrusion Detection Data Set","year":"2007","key":"25"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27192-2_25"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1904-8","volume":"487","author":"jolliffe","year":"1986","journal-title":"Principal Component Analysis"},{"key":"1","first-page":"233","article-title":"A survey on intrusion detection approaches, information and communication technologies","author":"murali","year":"2005","journal-title":"ICICT First International Conference on"},{"key":"7","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/IDA-2005-9306","article-title":"Evaluating indirect and direct classification techniques for network intrusion detection","volume":"9","author":"khoshgoftaar","year":"2005","journal-title":"Intelligent Data Analysis"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2005.12.014"},{"key":"5","article-title":"A survey of intrusion detection systems","author":"brown","year":"2000","journal-title":"TU Vienna"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"9","first-page":"789","article-title":"Genetic algorithm with different feature selection techniques for anomaly detectors generation","author":"aziz","year":"2013","journal-title":"IEEE Federated Conference on Computer Science and Information Systems (FedCSIS2013)"},{"key":"8","first-page":"249","article-title":"Supervised machine learning: A review of classification techniques","volume":"31","author":"kotsiantis","year":"2007","journal-title":"Informatica"}],"event":{"name":"2013 13th International Conference on Hybrid Intelligent Systems (HIS)","start":{"date-parts":[[2013,12,4]]},"location":"Gammarth, Tunisia","end":{"date-parts":[[2013,12,6]]}},"container-title":["13th International Conference on Hybrid Intelligent Systems (HIS 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6915059\/6920413\/06920485.pdf?arnumber=6920485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T06:37:01Z","timestamp":1565937421000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6920485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/his.2013.6920485","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}