{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:59:39Z","timestamp":1730260779033,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/idaacs-sws.2018.8525587","type":"proceedings-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T23:37:58Z","timestamp":1541720278000},"page":"149-153","source":"Crossref","is-referenced-by-count":3,"title":["Network Intrusion Detection Based on Hybrid Rice Algorithm Optimized Extreme Learning Machine"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Zhiwei","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Su","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruoxi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2011.12.054"},{"key":"ref11","first-page":"139","article-title":"An Intrusion Detection System Based on Hierarchical Self-Organization","author":"palomo","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095194"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2004.1380068"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2016.7581575"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IFCSTA.2009.25"},{"key":"ref3","first-page":"1","article-title":"Review on the development and future trend of the intrusion detection system (IDS)","author":"sun","year":"2017","journal-title":"International Conference on Communication and Electronics Systems"},{"key":"ref6","first-page":"1561","author":"liu","year":"2007","journal-title":"Letters A hierarchical intrusion detection model based on the PCA neural networks"},{"key":"ref5","article-title":"Intrusion Detection Based on Incremental Support Vector Machine","author":"du","year":"2017","journal-title":"Microcomputer Applications"},{"key":"ref8","first-page":"148","article-title":"Intrusion Detection Algorithm Based on BP Neural Network","volume":"38","author":"ming-xia","year":"2012","journal-title":"Computer Engineering"},{"key":"ref7","first-page":"363","article-title":"Principle components analysis and Support Vector Machine based Intrusion Detection System","author":"heba","year":"2013","journal-title":"International Conference on Intelligent Systems Design and Applications"},{"key":"ref2","first-page":"537","author":"ariyus","year":"2010","journal-title":"Intrusion Detection Systems (IDS) PartI"},{"key":"ref1","first-page":"1615","article-title":"Intrusion Detection Technology","volume":"24","author":"peng-cheng","year":"2008","journal-title":"Computer Knowledge and Technology"},{"key":"ref9","first-page":"699","volume":"116","author":"han","year":"2011","journal-title":"An Improved Extreme Learning Machine Based on Particle Swarm Optimization"}],"event":{"name":"2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)","start":{"date-parts":[[2018,9,20]]},"location":"Lviv","end":{"date-parts":[[2018,9,21]]}},"container-title":["2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8507706\/8525498\/08525587.pdf?arnumber=8525587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:59:57Z","timestamp":1643223597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8525587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/idaacs-sws.2018.8525587","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}