{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:57:29Z","timestamp":1750309049360,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T00:00:00Z","timestamp":1194566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,9]]},"DOI":"10.1145\/1316874.1316881","type":"proceedings-article","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T15:58:50Z","timestamp":1195228730000},"page":"33-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hierarchical two-tier ensemble learning"],"prefix":"10.1145","author":[{"given":"Morteza","family":"Analoui","sequence":"first","affiliation":[{"name":"Iran University of Science and Technology, Tehran, Iran"}]},{"given":"Behrouz Minaei","family":"Bidgoli","sequence":"additional","affiliation":[{"name":"Iran University of Science and Technology, Tehran, Iran"}]},{"given":"Mohammad Hossein","family":"Rezvani","sequence":"additional","affiliation":[{"name":"Iran University of Science and Technology, Tehran, Iran"}]}],"member":"320","published-online":{"date-parts":[[2007,11,9]]},"reference":[{"volume-title":"Proc. of the Workshop on Machine Learning, Methods and Applications","year":"2002","author":"Didaci L.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.06.003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Roli F. Kittler J. (Eds.) ''Multiple Classifier Systems'' Springer-Verlag Lecture Notes in Computer Science vol. 2364 2002.   Roli F. Kittler J. (Eds.) ''Multiple Classifier Systems'' Springer-Verlag Lecture Notes in Computer Science vol. 2364 2002.","DOI":"10.1007\/3-540-45428-4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.155943"},{"key":"e_1_3_2_1_6_1","first-page":"239","volume-title":"Proceedings of the Third International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing","author":"Mukkamala S.","year":"2003"},{"volume-title":"International Journal of Computer Science and Network Security (IJCSNS)","author":"Katar C.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Kuncheva L. I. ''Combining Multiple Classifiers: Methods and Algorithms'' New York John Wiley &amp; Sons 2004.   Kuncheva L. I. ''Combining Multiple Classifiers: Methods and Algorithms'' New York John Wiley &amp; Sons 2004.","DOI":"10.1002\/0471660264"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(85)90027-1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1995.7.5.867"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622859.1622868"},{"key":"e_1_3_2_1_12_1","unstructured":"Lincoln Laboratory ID Evaluation Website MIT http:\/\/www.ll.mit.edu\/IST\/ideval\/  Lincoln Laboratory ID Evaluation Website MIT http:\/\/www.ll.mit.edu\/IST\/ideval\/"},{"volume-title":"International Multi-conference of Engineers and Computer Scientists (IMECS)","year":"2007","author":"Minaei Bidgoli B.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382914"}],"event":{"name":"CIKM07: Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Lisbon Portugal","acronym":"CIKM07"},"container-title":["Proceedings of the ACM first Ph.D. workshop in CIKM"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1316874.1316881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1316874.1316881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:29:35Z","timestamp":1750285775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1316874.1316881"}},"subtitle":["a new paradigm for network intrusion detection"],"short-title":[],"issued":{"date-parts":[[2007,11,9]]},"references-count":14,"alternative-id":["10.1145\/1316874.1316881","10.1145\/1316874"],"URL":"https:\/\/doi.org\/10.1145\/1316874.1316881","relation":{},"subject":[],"published":{"date-parts":[[2007,11,9]]},"assertion":[{"value":"2007-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}