{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:13:29Z","timestamp":1774541609071,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/wincom.2018.8629718","type":"proceedings-article","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:30:54Z","timestamp":1548981054000},"page":"1-6","source":"Crossref","is-referenced-by-count":61,"title":["Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN"],"prefix":"10.1109","author":[{"given":"Hafsa","family":"BENADDI","sequence":"first","affiliation":[]},{"given":"Khalil","family":"IBRAHIMI","sequence":"additional","affiliation":[]},{"given":"Abderrahim","family":"BENSLIMANE","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"7","volume":"4","author":"dhanabal","year":"2015","journal-title":"A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms"},{"key":"ref11","first-page":"13","author":"bouzida","year":"0","journal-title":"Efficient intrusion detection using principal component analysis"},{"key":"ref12","first-page":"178","volume":"18","author":"kuang","year":"2014","journal-title":"A novel hybrid KPCA and SVM with GA model for intrusion detection Appl Soft Comput"},{"key":"ref13","first-page":"19","author":"kumar","year":"0","journal-title":"A Software Architecture to Support Misuse Intrusion Detection"},{"key":"ref14","first-page":"4","author":"chae","year":"0","journal-title":"Feature Selection for Intrusion Detection using NSL-KDD"},{"key":"ref15","first-page":"2581","article-title":"Anomaly Intrusion Detection using Information Theory, k-NN and KMC Algorithms","volume":"3","author":"shirazi","year":"2009","journal-title":"Australian Journal of Basic and Applied Sciences"},{"key":"ref16","first-page":"23","volume":"6","author":"siddiqui","year":"2013","journal-title":"Analysis of KDD CUP 99 Dataset using Clustering based Data Mining Int J Database Theory Appl"},{"key":"ref17","first-page":"2581","article-title":"Anomaly Intrusion Detection using Information Theory, k-NN and KMC Algorithms","volume":"3","author":"shirazi","year":"2009","journal-title":"Australian Journal of Basic and Applied Sciences"},{"key":"ref18","first-page":"99","author":"tavallaee","year":"0","journal-title":"A Detailed Analysis of the KDD CUP"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2017.8238162"},{"key":"ref4","volume":"smc 15","author":"keller","year":"1985","journal-title":"A Fuzzy k-Nearest Neighbor Algorithm IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.73"},{"key":"ref6","article-title":"Feature Reduction using Principal Component Analysis for Effective AnomalyBased Intrusion Detection on NSL-KDD","author":"lakhina","year":"2010","journal-title":"Int J Eng Sci Technol"},{"key":"ref5","first-page":"10","article-title":"A Feature Reduction using Principal Component Analysis for Effective AnomalyBased Intrusion Detection on NSL-KDD","volume":"2","author":"lakhina","year":"2010","journal-title":"Int J Eng Sci Technol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.9734\/BJAST\/2016\/23668"},{"key":"ref7","first-page":"323","volume":"1","author":"yang","year":"2012","journal-title":"A comparative study on the effect of feature selection on classification accuracy Procedia Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.09.045"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0953-0","author":"barbara","year":"2002","journal-title":"Applications of data mining in computer security Boston Mass Kluwer Acad Publ"},{"key":"ref9","article-title":"Efficient intrusion detection using principal component analysis","author":"bouzida","year":"2004","journal-title":"In 3eme Conference sur la Securite et Architectures Reseaux (SAR) La Londe France"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5120\/17021-7306"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1980.4766964"},{"key":"ref21","article-title":"Intrusion detection with unlabeled data using clustering","author":"portnoy","year":"2001","journal-title":"Proceedings of ACM CSS Workshop on Data Mining Applied to Security Philadelphia PA"},{"key":"ref23","article-title":"Nsl-kdd data set for network-based intrusion detection systems","year":"2009"}],"event":{"name":"2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)","location":"Marrakesh, Morocco","start":{"date-parts":[[2018,10,16]]},"end":{"date-parts":[[2018,10,19]]}},"container-title":["2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8622653\/8629585\/08629718.pdf?arnumber=8629718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T23:57:24Z","timestamp":1643241444000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8629718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wincom.2018.8629718","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}