{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T20:36:41Z","timestamp":1772051801503,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/idaacs.2017.8095208","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T16:03:52Z","timestamp":1511885032000},"page":"853-858","source":"Crossref","is-referenced-by-count":13,"title":["High performance adaptive system for cyber attacks detection"],"prefix":"10.1109","author":[{"given":"Myroslav","family":"Komar","sequence":"first","affiliation":[]},{"given":"Volodymyr","family":"Kochan","sequence":"additional","affiliation":[]},{"given":"Lesia","family":"Dubchak","sequence":"additional","affiliation":[]},{"given":"Anatoliy","family":"Sachenko","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Golovko","sequence":"additional","affiliation":[]},{"given":"Sergei","family":"Bezobrazov","sequence":"additional","affiliation":[]},{"given":"Ihor","family":"Romanets","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/DAAS.2016.7492594"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ELNANO.2016.7493091"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1615\/JAutomatInfScien.v39.i8.50"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2010.08.024"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"184","DOI":"10.31891\/1727-6209\/2016\/15\/3-184-190","article-title":"The methods of artificial intelligence for malicious applications detection in Android OS","volume":"15","author":"bezobrazov","year":"2016","journal-title":"International Journal of Computing"},{"key":"ref34","first-page":"534","article-title":"Intelligent cyber defense system","author":"komar","year":"2016","journal-title":"Proceedings of the 12th International Conference on ICT in Education Research and Industrial Applications Integration Harmonization and Knowledge Transfer (ICTERI 2016)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref11","first-page":"1","article-title":"Intrusion detection with genetic algorithms and fuzzy logic","author":"ireland","year":"2013","journal-title":"UMM CSci Senior Seminar Conference"},{"key":"ref12","first-page":"273","article-title":"Improved algorithm for intrusion detection using genetic algorithm and SNORT","volume":"4","author":"dave","year":"2014","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"ref13","first-page":"1","article-title":"Detecting network intrusions using signal processing with query-based sampling filter","author":"lia","year":"2009","journal-title":"Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"87","DOI":"10.3233\/ICA-2010-0334","article-title":"Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps","volume":"17","author":"bankovi?","year":"2010","journal-title":"Integrated Computer-Aided Engineering"},{"key":"ref15","author":"sung","year":"2011","journal-title":"Computationally Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6940-7_7"},{"key":"ref17","first-page":"457","article-title":"Anomaly network intrusion detection system based on distributed time-delay neural network (DTDNN)","volume":"5","author":"laheeb","year":"2010","journal-title":"Journal of Engineering Science and Technology"},{"key":"ref18","first-page":"62","article-title":"Development of methods for adaptive protection and computer security based on the theory of artificial immune systems","volume":"57","author":"skatkov","year":"2012","journal-title":"Radioelectronic and Computer Systems"},{"key":"ref19","first-page":"129","article-title":"Attack modeling and security evaluation in SIEM systems","volume":"8","author":"kotenko","year":"2012","journal-title":"International Transactions on Systems Science and Applications"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2011.6072777"},{"key":"ref4","first-page":"383","article-title":"Fusion of recirculation neural networks for real-time network intrusion detection and recognition","volume":"11","author":"kachurka","year":"2012","journal-title":"International Journal of Computing"},{"key":"ref27","first-page":"421","author":"greensmith","year":"2010","journal-title":"Artificial Immune Systems Handbook of Metaheuristics"},{"key":"ref3","first-page":"35","article-title":"Multi-agent simulation of attacks and defense mechanisms in computer networks","volume":"7","author":"kotenko","year":"2008","journal-title":"International Journal of Computing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5121\/ijdkp.2014.4203"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2013.6663008"},{"key":"ref5","first-page":"730","article-title":"Intrusion detection in computer network using genetic algorithm approach: a survey","volume":"6","author":"pawar","year":"2013","journal-title":"International Journal of Advances in Engineering & Technology"},{"key":"ref8","first-page":"17","article-title":"A survey on RBF neural network for intrusion detection system","volume":"4","author":"sheth","year":"2014","journal-title":"Int Journal of Engineering Research and Applications"},{"key":"ref7","first-page":"14","article-title":"Intrusion detection using multi-stage neural network","volume":"8","author":"selim","year":"2010","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.15217\/issn1684-8853.2015.4.69","article-title":"Hacker attack detection based on aggregation of neural, immune and neuro-fuzzy classifiers","volume":"4","author":"branitskiy","year":"2015","journal-title":"Information and Control Systems"},{"key":"ref9","year":"1999","journal-title":"KDD Cup 1999 data"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2015.26"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.1.23-31"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2006.253508"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2011.V1.27"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296580"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2001.943772"},{"key":"ref26","first-page":"1289","article-title":"Immunity by design","author":"hofmeyr","year":"1999","journal-title":"Proceeding of the Genetic and Evolutionary Computation Conference (GECCO'1999)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/262793.262811"}],"event":{"name":"2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","location":"Bucharest","start":{"date-parts":[[2017,9,21]]},"end":{"date-parts":[[2017,9,23]]}},"container-title":["2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8086093\/8095027\/08095208.pdf?arnumber=8095208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T01:17:40Z","timestamp":1603415860000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8095208\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/idaacs.2017.8095208","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}