{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:23:17Z","timestamp":1730298197595,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/snpd.2018.8441094","type":"proceedings-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T22:08:40Z","timestamp":1535062120000},"page":"218-223","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Intrusion Detection System using K-Means and Random Tree Algorithms"],"prefix":"10.1109","author":[{"given":"Yi Yi","family":"Aung","sequence":"first","affiliation":[]},{"given":"Myat Myat","family":"Min","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"975","article-title":"Performance Evaluation of Decision Tree Classifiers for Ranked Features of Intrusion Detection","volume":"2","author":"patel","year":"2013","journal-title":"Journal of Information Knowledge and Research in Information Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.7815\/ijorcs.24.2012.037"},{"key":"ref12","first-page":"2320","article-title":"Hybrid Intrusion Detection Model Based on Clustering and Association","volume":"3","author":"somani","year":"2014","journal-title":"International Journal of Advanced Research in Electrical Electronics and Instrumentation Engineering"},{"key":"ref13","first-page":"2277","article-title":"Performance Analysis of Different Feature Selection Methods in Intrusion Detection","volume":"2","author":"aggarwal","year":"2013","journal-title":"International Journal of Scientific & Technology Research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.9790\/3021-0203468472"},{"journal-title":"NIST Special Publication on Intrusion Detection Systems","year":"0","author":"bace","key":"ref15"},{"journal-title":"A Hybrid Approach to improve the Anomaly Detection Rate Using Data Mining Techniques","year":"2015","author":"bansal","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2013.6.5.03"},{"key":"ref4","first-page":"2545","article-title":"An Intrusion Detection System Using Machine Learning Algorithm","volume":"4","author":"ugochukwu","year":"2018","journal-title":"International Journal of Computer Science and Mathematical Theory"},{"key":"ref3","first-page":"799","article-title":"Evolution of Intrusion Detection System Based on Machine Learning Methods","volume":"7","author":"aburomman","year":"2013","journal-title":"Australian Journal of Basic and Applied Sciences"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/int.20203"},{"key":"ref5","article-title":"Detection & Classification of Internet Intrusion Based on the Comination of Random Forest and Naive Bayes","volume":"5","author":"chihab","year":"2013","journal-title":"International Journal of Engineering and Technology (IJET)"},{"key":"ref8","first-page":"21","article-title":"Intrusion Detection System with Decision Tree and Combine Method Algorithm","volume":"3","author":"mazraeh","year":"2016","journal-title":"International Academic Journal of Science and Engineering"},{"key":"ref7","first-page":"2319","article-title":"Intrusion Detection System Using Weka Data Mining Tool","volume":"6","author":"hassan","year":"2017","journal-title":"Internaitonal Journal of Science and Research (IJSR)"},{"journal-title":"Evaluation of Machine Learning Algorithms for Intrusion Detection System","year":"2014","author":"almseidin","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5120\/13334-0928"},{"key":"ref9","first-page":"1819","article-title":"Machine Learning in Network Intrusion Detection System","volume":"11","author":"umamaheswari","year":"2016","journal-title":"ARPN Journal of Engineering and Applied Science"}],"event":{"name":"2018 19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2018,6,27]]},"location":"Busan","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 19th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8422066\/8441025\/08441094.pdf?arnumber=8441094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:54:01Z","timestamp":1643212441000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8441094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/snpd.2018.8441094","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}