{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:11:18Z","timestamp":1771697478559,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,3,18]]},"DOI":"10.1145\/1167253.1167288","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"136-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":218,"title":["Decision tree classifier for network intrusion detection with GA-based feature selection"],"prefix":"10.1145","author":[{"given":"Gary","family":"Stein","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Bing","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Annie S.","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]},{"given":"Kien A.","family":"Hua","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL"}]}],"member":"320","published-online":{"date-parts":[[2005,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967989"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. 1st Int'l Conf. On Genetic Algorithms. Pg 101--111","author":"Baker J. E.","year":"1985","unstructured":"Baker , J. E. Adaptive selection methods for genetic algorithms . In Proc. 1st Int'l Conf. On Genetic Algorithms. Pg 101--111 , 1985 .]] Baker, J. E. Adaptive selection methods for genetic algorithms. In Proc. 1st Int'l Conf. On Genetic Algorithms. Pg 101--111, 1985.]]"},{"key":"e_1_3_2_1_3_1","first-page":"3","volume-title":"Proc. Genetic and Evolutionary Computation Conference. (GECCO)","author":"Balthrop J.","year":"2002","unstructured":"Balthrop , J. , Esponda , F. , Forrest , S. , and Glickman , M . Coverage and generalization in an artificial immune system . In Proc. Genetic and Evolutionary Computation Conference. (GECCO) , pp. 3 -- 10 , 2002 .]] Balthrop, J., Esponda, F., Forrest, S., and Glickman, M. Coverage and generalization in an artificial immune system. In Proc. Genetic and Evolutionary Computation Conference. (GECCO), pp. 3--10, 2002.]]"},{"key":"e_1_3_2_1_4_1","first-page":"149","volume-title":"Proceedings of SAICSIT 2002","author":"Botha M.","year":"2002","unstructured":"Botha , M. , Solms , R. V. , Perry , K. , Loubser , E. , and Yamoyany , G . The utilization of artificial intelligence in a hybrid intrusion detection system . In Proceedings of SAICSIT 2002 , pp. 149 -- 155 , 2002 .]] Botha, M., Solms, R. V., Perry, K., Loubser, E., and Yamoyany, G. The utilization of artificial intelligence in a hybrid intrusion detection system. In Proceedings of SAICSIT 2002, pp. 149--155, 2002.]]"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proc. 1995 AAAI Symposium on Genetic Programming","author":"Crosbie M.","unstructured":"Crosbie , M. , and Spafford , G . Applying genetic programming to intrusion detection . In Proc. 1995 AAAI Symposium on Genetic Programming , pp. 1 -- 8 .]] Crosbie, M., and Spafford, G. Applying genetic programming to intrusion detection. In Proc. 1995 AAAI Symposium on Genetic Programming, pp. 1--8.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646768.704442"},{"key":"e_1_3_2_1_7_1","first-page":"156","volume-title":"Proc. 18th International Conference on Machine Learning (ICML-2001)","author":"Gartner T.","unstructured":"Gartner , T. , and Flach , P. A . WBCsvm: Weighted Bayesian Classification based on support vector machine . In Proc. 18th International Conference on Machine Learning (ICML-2001) , pp. 156 -- 161 .]] Gartner, T., and Flach, P. A. WBCsvm: Weighted Bayesian Classification based on support vector machine. In Proc. 18th International Conference on Machine Learning (ICML-2001), pp. 156--161.]]"},{"key":"e_1_3_2_1_8_1","first-page":"141","volume-title":"8th USENIX Security Symposium","author":"Ghosh A.","year":"1999","unstructured":"Ghosh , A. , and Schwartzbard , A . A study in using neural networks for anomaly and misuse Detection . 8th USENIX Security Symposium , pp. 141 -- 151 , 1999 .]] Ghosh, A., and Schwartzbard, A. A study in using neural networks for anomaly and misuse Detection. 8th USENIX Security Symposium, pp. 141--151, 1999.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Adaptation in natural and artificial systems","author":"Holland J. H.","year":"1975","unstructured":"Holland , J. H. ( 1975 ). Adaptation in natural and artificial systems . University of Michigan Press (reprinted in 1992 by MIT Press, Cambridge, MA ).]] Holland, J. H. (1975). Adaptation in natural and artificial systems. University of Michigan Press (reprinted in 1992 by MIT Press, Cambridge, MA).]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45110-2_108"},{"key":"e_1_3_2_1_11_1","unstructured":"KDDCUP 1999 http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html]]  KDDCUP 1999 http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-377-6.50045-1"},{"key":"e_1_3_2_1_13_1","volume-title":"Feature Extraction, Construction and Selection: A Data Mining Perspective","author":"Kohavi R.","year":"1998","unstructured":"Kohavi , R. , and John , G . The wrapper approach . In Motoda, H., and Liu, H. (eds.), Feature Extraction, Construction and Selection: A Data Mining Perspective . Kluwer Academic Publishers , July 1998 .]] Kohavi, R., and John, G. The wrapper approach. In Motoda, H., and Liu, H. (eds.), Feature Extraction, Construction and Selection: A Data Mining Perspective. Kluwer Academic Publishers, July 1998.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846201"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. United States Department of Energy Cyber Security Group 2004 Training Conference","author":"Li W.","year":"2004","unstructured":"Li , W. Using Genetic Algorithm for network intrusion detection . In Proc. United States Department of Energy Cyber Security Group 2004 Training Conference , Kansas City, Kansas, May 24--27 , 2004 .]] Li, W. Using Genetic Algorithm for network intrusion detection. In Proc. United States Department of Energy Cyber Security Group 2004 Training Conference, Kansas City, Kansas, May 24--27, 2004.]]"},{"issue":"2","key":"e_1_3_2_1_17_1","first-page":"179","article-title":"Decision tree classifier for computer intrusion detection","volume":"4","author":"Li X.","year":"2001","unstructured":"Li , X. , and Ye , N . Decision tree classifier for computer intrusion detection . Journal of Parallel and Distributed Computing Practices , 4 ( 2 ), pp. 179 -- 190 , 2001 .]] Li, X., and Ye, N. Decision tree classifier for computer intrusion detection. Journal of Parallel and Distributed Computing Practices, 4(2), pp. 179--190, 2001.]]","journal-title":"Journal of Parallel and Distributed Computing Practices"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720290"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.0824-7935.2004.00247.x"},{"key":"e_1_3_2_1_20_1","first-page":"371","volume-title":"Proc. Int'l Symp. on Intelligent Data Engineering and Learning'98","author":"Pei M.","unstructured":"Pei , M. , Goodman , E. D. , and Punch , W. F . Feature extraction using genetic algorithms . In Proc. Int'l Symp. on Intelligent Data Engineering and Learning'98 . pp. 371 -- 384 .]] Pei, M., Goodman, E. D., and Punch, W. F. Feature extraction using genetic algorithms. In Proc. Int'l Symp. on Intelligent Data Engineering and Learning'98. pp. 371--384.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846200"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/645513.657588"},{"key":"e_1_3_2_1_23_1","volume-title":"Programs for Machine Learning. Morgan Kaufmann San Mateo Ca","author":"Quinlan J. R.","year":"1993","unstructured":"Quinlan , J. R. ( 1993 ). C4.5 , Programs for Machine Learning. Morgan Kaufmann San Mateo Ca , 1993.]] Quinlan, J. R. (1993). C4.5, Programs for Machine Learning. Morgan Kaufmann San Mateo Ca, 1993.]]"},{"key":"e_1_3_2_1_24_1","first-page":"371","volume-title":"Proc. 1999 Ann. Comp. Security Application Conf.","author":"Sinclair C.","unstructured":"Sinclair , C. , Pierce , L. , and Matzner , S . An application of machine learning to network intrusion detection . In Proc. 1999 Ann. Comp. Security Application Conf. , pp 371 -- 377 .]] Sinclair, C., Pierce, L., and Matzner, S. An application of machine learning to network intrusion detection. In Proc. 1999 Ann. Comp. Security Application Conf., pp 371--377.]]"},{"key":"e_1_3_2_1_25_1","first-page":"209","volume-title":"Proceedings of the 2003 Symposium on Applications and the Internet.","author":"Sung A. H.","unstructured":"Sung , A. H. , and Mukkamala , S . Identifying important features for intrusion detection using support vector machines and neural networks . In Proceedings of the 2003 Symposium on Applications and the Internet. pp. 209 -- 216 .]] Sung, A. H., and Mukkamala, S. Identifying important features for intrusion detection using support vector machines and neural networks. In Proceedings of the 2003 Symposium on Applications and the Internet. pp. 209--216.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/645838.670720"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846202"}],"event":{"name":"ACM SE05: ACM Southeast Regional Conference 2005","location":"Kennesaw Georgia","acronym":"ACM SE05","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 43rd annual Southeast regional conference - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1167253.1167288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T00:57:18Z","timestamp":1673312238000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1167253.1167288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3,18]]},"references-count":27,"alternative-id":["10.1145\/1167253.1167288","10.1145\/1167253"],"URL":"https:\/\/doi.org\/10.1145\/1167253.1167288","relation":{},"subject":[],"published":{"date-parts":[[2005,3,18]]},"assertion":[{"value":"2005-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}