{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:09:06Z","timestamp":1767262146554,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/ijcnn.2019.8851756","type":"proceedings-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T03:44:32Z","timestamp":1569901472000},"page":"1-5","source":"Crossref","is-referenced-by-count":21,"title":["Intrusion detection method based on information gain and ReliefF feature selection"],"prefix":"10.1109","author":[{"given":"Yong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xuezhen","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Machine-learning-based feature selection techniques for large-scale network intrusion detection","author":"ai-jarrah","year":"2014","journal-title":"Proceedings of IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008280620621"},{"article-title":"Machine Learning","year":"2017","author":"mitchell","key":"ref12"},{"key":"ref13","article-title":"The feature selection problem: traditional methods and a new algorithm","author":"kira","year":"1992","journal-title":"Proceedings of AAAI-92"},{"key":"ref14","first-page":"171","article-title":"Estimating attributes: analysis and extensions of relief","author":"kononenko","year":"1994","journal-title":"European Conference on Machine Learning"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17929\/tqs.3.1","article-title":"A proposal of regression hybrid modeling for combining random forest and x-means methods","volume":"3","author":"yuma","year":"2017","journal-title":"Total Quality Science"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.06.007"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.eswa.2017.07.005","article-title":"A feature reduced intrusion detection system using ANN classifier","volume":"88","author":"sharma","year":"2017","journal-title":"Expert Systems with Applications"},{"key":"ref6","article-title":"Applications of extreme learning machine in the intrusion detection","author":"luo","year":"2011","journal-title":"Proceedings of 4th IEEE International Conference on Computer Science and Information Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.72"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SNS-PCS.2013.6553837"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2014.6912144"},{"key":"ref2","article-title":"A detailed investigation and analysis of using machine learning techniques for intrusion detection","author":"mishra","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"journal-title":"Computer Security Threat Monitoring and Surveillance","year":"1980","author":"anderson","key":"ref1"},{"key":"ref9","first-page":"312","article-title":"An improved ant colony clustering method for network intrusion detection","author":"meng","year":"2013","journal-title":"Proc of IEEE Intl Conf on Networking Architecture and Storage (NAS"}],"event":{"name":"2019 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2019,7,14]]},"location":"Budapest, Hungary","end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8840768\/8851681\/08851756.pdf?arnumber=8851756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:48:14Z","timestamp":1658094494000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8851756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2019.8851756","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}