{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:34:24Z","timestamp":1774456464020,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mipro.2015.7160479","type":"proceedings-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T22:02:26Z","timestamp":1437084146000},"page":"1318-1323","source":"Crossref","is-referenced-by-count":20,"title":["Artificial intelligence in network intrusion detection"],"prefix":"10.1109","author":[{"given":"M.","family":"Stampar","sequence":"first","affiliation":[]},{"given":"K.","family":"Fertalj","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"16","article-title":"Multiple self-organizing maps for intrusion detection","author":"rhodes","year":"2000","journal-title":"Proc NISSC'00"},{"key":"ref38","article-title":"Dynamic intrusion detection using self-organizing maps","author":"lichodzijewski","year":"2002","journal-title":"Proc CITSS'02"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"40","DOI":"10.5120\/758-993","article-title":"Intrusion detection system using support vector machine and decision tree","author":"mulay","year":"2010","journal-title":"International Journal of Computer Applications"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACIIDS.2009.59"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0002-5"},{"key":"ref30","first-page":"50","article-title":"Learning intrusion detection: supervised or unsupervised?","author":"laskov","year":"2005","journal-title":"Proc ICIAP'05"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICOCI.2006.5276609"},{"key":"ref36","article-title":"Som pak: The self-organizing map program package","author":"kohonen","year":"1996"},{"key":"ref35","article-title":"Network Intrusion Detection using Random Forests","author":"zhang","year":"2005","journal-title":"Proc of PST '05"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11760191_33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.10.002"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-21004-4","volume":"17","author":"grosan","year":"2011","journal-title":"Intelligent systems A modern approach"},{"key":"ref12","article-title":"A Study in Using Neural Networks for Anomaly and Misuse Detection","author":"ghosh","year":"1999","journal-title":"Proc Usenix Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00140-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213257"},{"key":"ref15","first-page":"1","article-title":"Using genetic algorithm for network intrusion detection","author":"li","year":"2004","journal-title":"Proc of the United States Department of Energy Cyber Security Group"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1007\/978-3-540-24677-0_65","article-title":"Modeling intrusion detection systems using linear genetic programming approach","author":"mukkamala","year":"2004","journal-title":"Innovations in Applied Artificial Intelligence"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref18","article-title":"A hybrid machine learning and fuzzy logic approach to CIT diagnostic development","author":"williams","year":"2007","journal-title":"Fifth Conference on Artificial Intelligence Applications to Environmental Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2006.253508"},{"key":"ref28","article-title":"Efficient intrusion detection using principal component analysis","author":"bouzida","year":"2004","journal-title":"Proc SAR'04"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s00354-011-0300-3","article-title":"Special Issue on Hybrid and Ensemble Methods in Machine Learning","volume":"29","author":"kazienko","year":"2011","journal-title":"New Generation Computing"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286488"},{"key":"ref3","author":"charniak","year":"1985","journal-title":"Introduction to Artificial Intelligence"},{"key":"ref6","year":"2014","journal-title":"DARPA Intrusion Detection Data Sets webpage on The MIT Lincoln Laboratory website"},{"key":"ref29","first-page":"301","article-title":"The kernel trick for distances","author":"scholkopf","year":"2001","journal-title":"Advances in neural information processing systems"},{"key":"ref5","year":"2015","journal-title":"Intrusion Detection FAQ"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312212"},{"key":"ref7","year":"2014","journal-title":"KDD Cup 1999 Computer network intrusion detection webpage on SIGKDD website"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932195"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382923"},{"key":"ref1","article-title":"Application Vulnerability Trends Report: 2014","year":"2014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/11937807_13"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2000.877441"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.02.102"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/UKCI.2013.6651315"},{"key":"ref42","first-page":"28","article-title":"Neural networks vs. decision trees for intrusion detection","author":"bouzida","year":"2006","journal-title":"Proc MonAM'06"},{"key":"ref24","volume":"273","author":"caball\u00e9","year":"2010","journal-title":"Computational Intelligence for Technology Enhanced Learning"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2004.03.019"},{"key":"ref23","article-title":"The optimality of naive Bayes","volume":"1","author":"zhang","year":"2004","journal-title":"AA"},{"key":"ref44","first-page":"118","article-title":"Intrusion detection systems using decision trees and support vector machines","volume":"11 3","author":"peddabachigari","year":"2004","journal-title":"International Journal of Applied Science and Computations USA"},{"key":"ref26","article-title":"Naive bayesian networks in intrusion detection systems","author":"amor","year":"2003","journal-title":"Proc PG '03"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967989"},{"key":"ref25","first-page":"258","article-title":"Network intrusion detection using naive bayes","author":"panda","year":"2007","journal-title":"International Journal of Computer Science and Network Security"}],"event":{"name":"2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","location":"Opatija, Croatia","start":{"date-parts":[[2015,5,25]]},"end":{"date-parts":[[2015,5,29]]}},"container-title":["2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7153596\/7160221\/07160479.pdf?arnumber=7160479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T09:39:12Z","timestamp":1566985152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7160479\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/mipro.2015.7160479","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}