{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T10:21:26Z","timestamp":1776334886578,"version":"3.51.2"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2016,10,1]]},"DOI":"10.1109\/tc.2016.2519914","type":"journal-article","created":{"date-parts":[[2016,1,20]],"date-time":"2016-01-20T20:59:19Z","timestamp":1453323559000},"page":"2986-2998","source":"Crossref","is-referenced-by-count":521,"title":["Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm"],"prefix":"10.1109","volume":"65","author":[{"given":"Mohammed A.","family":"Ambusaidi","sequence":"first","affiliation":[]},{"given":"Xiangjian","family":"He","sequence":"additional","affiliation":[]},{"given":"Priyadarsi","family":"Nanda","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018628609742"},{"key":"ref38","article-title":"A practical guide to support vector classification","author":"hsu","year":"0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066138"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2005.06.010"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2004.841414"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref37","author":"press","year":"1986","journal-title":"Numerical Recipes"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.08.014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005601"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/72.977291"},{"key":"ref28","author":"fukunaga","year":"2013","journal-title":"Introduction to statistical pattern recognition"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/S0167-2789(98)00269-3","article-title":"Estimating the errors on measured entropy and mutual information","volume":"125","author":"s","year":"1999","journal-title":"Physica D Nonlinear Phenomena"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.52.2318"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846200"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.105"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.006"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-3-642-40846-5_11","article-title":"Network anomaly classification by support vector classifiers ensemble and non-linear projection techniques","volume":"8073","author":"hoz","year":"0","journal-title":"Proc 8th Int Conf Hybrid Artif Intell Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27189-2_21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.eij.2014.01.001","article-title":"A proposed http service based ids","volume":"15","author":"m","year":"2014","journal-title":"Egyptian Informatics J"},{"key":"ref26","author":"cover","year":"2012","journal-title":"Elements of Information Theory"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40597-6_21"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.29"},{"key":"ref56","first-page":"28","article-title":"Neural networks vs. decision trees for intrusion detection","author":"bouzida","year":"0","journal-title":"Proc of IEEE\/IST Workshop on Monitoring Attack Detection and Mitigation (MonAM 2006)"},{"key":"ref55","first-page":"1","article-title":"Applying a new localized generalization error model to design neural networks trained with extreme learning machine","author":"liu","year":"2014","journal-title":"Neural Comput Appl"},{"key":"ref54","first-page":"215","article-title":"A comparison of support vector machine and multi-level support vector machine on intrusion detection","volume":"2","author":"aghamohammadi","year":"2012","journal-title":"World Comput Sci Inf Technol"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.12.009"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2006.148"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/72.298224"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2011.2168604"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-284-5_11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.01.022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.066"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32129-0_34"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45235-5_73"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846201"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2004.01.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6154-8_49"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2375218"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.387"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2007.10.012"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.088"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20505-7_26"},{"key":"ref47","first-page":"5","article-title":"Discriminative multinomial naive Bayes for network intrusion detection","author":"panda","year":"0","journal-title":"Proc 6th Int Conf Inf Assurance Security"},{"key":"ref42","first-page":"101","article-title":"In defense of one-vs-all classification","volume":"5","author":"rifkin","year":"2004","journal-title":"Journal of Machine Learning Research"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821515"},{"key":"ref44","author":"croft","year":"2010","journal-title":"Search Engines Information Retrieval in Practice"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7560676\/07387736.pdf?arnumber=7387736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:20:56Z","timestamp":1642004456000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7387736\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":56,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tc.2016.2519914","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}