{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:13:14Z","timestamp":1761109994299,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/socpar.2010.5686163","type":"proceedings-article","created":{"date-parts":[[2011,1,13]],"date-time":"2011-01-13T21:34:31Z","timestamp":1294954471000},"page":"334-337","source":"Crossref","is-referenced-by-count":9,"title":["Improving the accuracy of intrusion detection systems by using the combination of machine learning approaches"],"prefix":"10.1109","author":[{"given":"Hadi","family":"Sarvari","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad Mehdi","family":"Keikha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"20463","article-title":"Hybrid Neural Network and C4.5 for Misuse Detection","author":"pan","year":"0","journal-title":"China IEEE"},{"key":"ref11","first-page":"2201","article-title":"A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers","author":"nadjaran","year":"2007","journal-title":"Computer Communications 30(2007)"},{"key":"ref12","article-title":"Ada Boost-Based Algorithm for Network Intrusion Detection","volume":"38","author":"hu","year":"2008","journal-title":"IEEE Trans Systems Man and Cybernetics Part B Cybernetics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77444-0_41"},{"key":"ref14","first-page":"20","article-title":"Development of Genetic-based Machine Learning for Network Intrusion Detection (GBML-NID)","author":"sharafat","year":"2009","journal-title":"World Academy of Science Engineering and Technology"},{"key":"ref15","first-page":"209","article-title":"Application of machine learning algorithms to KDD intrusion detection data set within misuse detection context","author":"sabhnani","year":"0","journal-title":"CSRE"},{"key":"ref16","article-title":"A New Framework for Learning Classifier Models in DataMining","author":"agarwal","year":"2000","journal-title":"ReportNo RC-21719"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/21.52545"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1012428"},{"key":"ref6","first-page":"173","article-title":"Using Decision Trees to Improve Signature Based Intrusion Detection","volume":"2","author":"kruegel","year":"2004","journal-title":"In Proceeding of the 5th Recent Advances in Intrusion Detection 2003 (RAID2003) LNCS2820"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286488"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363897"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-34749-3_34"},{"key":"ref2","first-page":"1170","article-title":"Effective Value of Decision Tree with KDD99 Intrusion Detection Data sets for Intrusion Detection System","volume":"17 20","author":"lee","year":"2008","journal-title":"International Conference on Advanced Communication Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.05.002"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1229285.1229292","article-title":"Network Anomaly Detection Based on TCM-KNN Algorithm","author":"li","year":"2007","journal-title":"Proceeding of the 2nd ACM symposium on Information computer and communications security"}],"event":{"name":"2010 International Conference of Soft Computing and Pattern Recognition (SoCPaR)","start":{"date-parts":[[2010,12,7]]},"location":"Cergy-Pontoise, France","end":{"date-parts":[[2010,12,10]]}},"container-title":["2010 International Conference of Soft Computing and Pattern Recognition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5680735\/5685841\/05686163.pdf?arnumber=5686163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T10:00:20Z","timestamp":1637143220000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5686163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/socpar.2010.5686163","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}