{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:44:41Z","timestamp":1729611881447,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/nabic.2010.5716289","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T14:03:54Z","timestamp":1298037834000},"page":"115-120","source":"Crossref","is-referenced-by-count":3,"title":["A new system to evaluate GA-based clustering algorithms in Intrusion Detection alert management system"],"prefix":"10.1109","author":[{"given":"H","family":"Bahrbegi","sequence":"first","affiliation":[]},{"given":"Ahmad Habibizad","family":"Navin","sequence":"additional","affiliation":[]},{"given":"Amir Azimi Alasti","family":"Ahrabi","sequence":"additional","affiliation":[]},{"given":"M K","family":"Mirnia","sequence":"additional","affiliation":[]},{"given":"A","family":"Mollanejad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/01969727308546046"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02830-8","article-title":"Genetic Algorithms + Data Structures = Evolution Programs","author":"michalewicz","year":"1992"},{"article-title":"Handbook of Genetic Algorithms","year":"1991","author":"davis","key":"ref32"},{"key":"ref31","first-page":"534","article-title":"Genetic Algorithm and Simulated Annealing based Approaches to Categorical Data Clustering","volume":"i","author":"mukhopadhyay","year":"2008","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists"},{"journal-title":"Aldenderfer Blashfield Cluster Analysis","first-page":"7","year":"1984","key":"ref30"},{"article-title":"Clustering Algorithms","year":"1975","author":"hartigan","key":"ref37"},{"key":"ref36","first-page":"123","article-title":"An Improved Convergence Theory for the Fuzzy Isodata Clustering Algorithms","volume":"3","author":"hathaway","year":"1987","journal-title":"The Analysis of Fuzzy Information"},{"volume":"27","first-page":"28","year":"1994","key":"ref35"},{"article-title":"Genetic algorithm programming environments","year":"0","author":"filho","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2008.018521"},{"key":"ref11","article-title":"An Assessment of the DARPA IDS Evaluation Dataset Using Snort","author":"terry brugger","year":"2007","journal-title":"Tech Report CSE-00&#x2013;1"},{"journal-title":"Snort the open source network intrusion detection system","year":"0","key":"ref12"},{"journal-title":"DARPA 1998 Intrusion Detection Evaluation Datasets","year":"1998","key":"ref13"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"article-title":"Genetic Algorithms in Search, Optimization and Machine Learning","year":"1989","author":"goldberg","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1992.183445"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00137-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/3477.764879"},{"key":"ref28","first-page":"1","article-title":"A Novel FPCM Based Vector Quantizer Codebook Design for Image Compression in the Wavelet Packet Domain","volume":"2","author":"nagendran","year":"2010","journal-title":"The International journal of Multimedia &amp; Its Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991518"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2004.840099"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991517"},{"key":"ref6","first-page":"2093","author":"wang","year":"2006","journal-title":"A GA-based Solution to an NP-hard Problem of Clustering Security Events"},{"year":"0","key":"ref29"},{"key":"ref5","article-title":"Mirador: a cooperative approach of IDS","author":"mirador","year":"2000","journal-title":"European Symposium on Research in Computer Security (ESORICS)"},{"key":"ref8","first-page":"1","article-title":"The Research of NIDS Based on Improved GA","author":"pei-li","year":"2009","journal-title":"Wireless Communications Networking and Mobile Computing"},{"key":"ref7","first-page":"586","article-title":"Clustering IDS Alarms with an IGA-based Approach","author":"wang","year":"2009","journal-title":"ICCCAS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CISIM.2008.49"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref20","first-page":"641","article-title":"An Improved Genetic Approach","author":"liu","year":"2005","journal-title":"Int Conf Neural Networks and Brain"},{"key":"ref22","first-page":"33","article-title":"The hybrid genetic fuzzy C-means: a reasoned implementation","author":"di nuovo","year":"2006","journal-title":"Proceedings of the 7th WSEAS International Conference on Fuzzy Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/967900.968029"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/91.227387"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1997.616338"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1970.222992"},{"key":"ref25","first-page":"385","article-title":"crisp Interpretations of fuzzy and possibilistic c-means algorithm: insights and recommendations","volume":"4","year":"1995","journal-title":"IEEE Trans Fuzzy Systems"}],"event":{"name":"2010 Second World Congress on Nature and Biologically Inspired Computing (NaBIC 2010)","start":{"date-parts":[[2010,12,15]]},"location":"Fukuoka","end":{"date-parts":[[2010,12,17]]}},"container-title":["2010 Second World Congress on Nature and Biologically Inspired Computing (NaBIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710537\/5716265\/05716289.pdf?arnumber=5716289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T15:57:34Z","timestamp":1497887854000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716289\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/nabic.2010.5716289","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}