{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:05:46Z","timestamp":1729652746343,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/ijcnn.2014.6889931","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T10:30:33Z","timestamp":1410345033000},"page":"1386-1392","source":"Crossref","is-referenced-by-count":0,"title":["Intrusion detection using a cascade of boosted classifiers (CBC)"],"prefix":"10.1109","author":[{"given":"Mubasher","family":"Baig","sequence":"first","affiliation":[]},{"given":"El-Sayed M.","family":"El-Alfy","sequence":"additional","affiliation":[]},{"given":"Mian M.","family":"Awais","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/UKRICIS.2010.5898149"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116037"},{"key":"18","first-page":"313","article-title":"Using output codes to boost multiclass learning problems","volume":"97","author":"schapire","year":"1997","journal-title":"Proc Fourth Int'l Conf Machine Learning"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34481-7_55"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007515423169"},{"key":"14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","article-title":"Ensemble methods in machine learning","volume":"1857","author":"dietterich","year":"2000","journal-title":"Multiple Classifer Systems"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"12","first-page":"149","author":"schapire","year":"2003","journal-title":"The boosting approach to machine learning An overview"},{"journal-title":"KDD Cup 1999 Dataset for Network-based Intrusion Detection Systems","year":"0","key":"21"},{"key":"20","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1613\/jair.105","article-title":"Solving multiclass learning problems via error-correcting output codes","volume":"2","author":"dietterich","year":"1995","journal-title":"Journal of Artifcial Intelligence Research"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990517"},{"key":"23","article-title":"Mining network data for intrusion detection through combining SVMs with ant colony networks","author":"feng","year":"2013","journal-title":"Future Generation Computer Systems"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.proenv.2011.12.040"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2011.10.001"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.11.028"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"journal-title":"Intrusion Detection Systems A Survey and Taxonomy","year":"2000","author":"axelsson","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"1","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/978-3-540-30176-9_41","article-title":"An ontology for network security attacks","author":"simmonds","year":"2004","journal-title":"Applied Computing"},{"key":"7","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/978-3-540-45235-5_73","article-title":"Network-based intrusion detection with support vector machines","author":"kim","year":"2003","journal-title":"Information Networking"},{"key":"6","first-page":"943","article-title":"Intrusion detection with neural networks","author":"ryan","year":"1998","journal-title":"Advances in neural information processing systems"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.09.045"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_82"}],"event":{"name":"2014 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880678\/6889358\/06889931.pdf?arnumber=6889931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T17:26:23Z","timestamp":1565803583000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6889931\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2014.6889931","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}