{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:55Z","timestamp":1750306795506,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490453","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"179-184","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["adsvm"],"prefix":"10.1145","author":[{"given":"Annie","family":"George","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Kerala, India"}]},{"given":"Prabaharan","family":"Poornachandran","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Kerala, India"}]},{"given":"M. Ramachandra","family":"Kaimal","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, Kerala, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of lisa '99:  13th systems administration conference","author":"Roesch Martin","year":"1999","unstructured":"Martin Roesch , \" Snort -- Light weight Intrusion Detection for Networks\" , Proceedings of lisa '99: 13th systems administration conference , Seattle, Washington, USA , November 7--12, 1999 Martin Roesch, \"Snort -- Light weight Intrusion Detection for Networks\", Proceedings of lisa '99: 13th systems administration conference, Seattle, Washington, USA, November 7--12, 1999"},{"volume-title":"Konrad RIECK and Klaus-Robert M\u00dcLLER, \"Machine Learning for Intrusion Detection\", a Fraunhofer Institute FIRST.IDA","author":"Laskov Pavel","key":"e_1_3_2_1_2_1","unstructured":"Pavel Laskov , Konrad RIECK and Klaus-Robert M\u00dcLLER, \"Machine Learning for Intrusion Detection\", a Fraunhofer Institute FIRST.IDA , University of T\u00fcbingen, Wilhelm-Schickard-Institute for Computer Science Technical University of Berlin Pavel Laskov, Konrad RIECK and Klaus-Robert M\u00dcLLER, \"Machine Learning for Intrusion Detection\", a Fraunhofer Institute FIRST.IDA, University of T\u00fcbingen, Wilhelm-Schickard-Institute for Computer Science Technical University of Berlin"},{"key":"e_1_3_2_1_3_1","unstructured":"zhangxue-qin gu chun-hua and linjia-jun \" Intrusion detection system based on feature selection and support vector machine\" east china university of science and technology  zhangxue-qin gu chun-hua and linjia-jun \" Intrusion detection system based on feature selection and support vector machine \" east china university of science and technology"},{"key":"e_1_3_2_1_4_1","volume-title":"And Integration Into Nprobe","author":"Eugene Brian","year":"1993","unstructured":"Brian Eugene , Lavender B. S.\" Implementation Of Genetic Algorithms Into A Network Intrusion Detection System (Netga) , And Integration Into Nprobe \", California Polytechnic State University , San Luis Obispo, 1993 Brian Eugene, Lavender B. S.\" Implementation Of Genetic Algorithms Into A Network Intrusion Detection System (Netga), And Integration Into Nprobe\", California Polytechnic State University, San Luis Obispo, 1993"},{"volume-title":"Weiping Zhu School of Engineering and Information Technology (SEIT) Univiersity of New South Wales","author":"Shafi Kamran","key":"e_1_3_2_1_5_1","unstructured":"Kamran Shafi , Hussein A. Abbass , \" A Methodology to Evaluate Supervised Learning Algorithms for Intrusion Detection\" , Weiping Zhu School of Engineering and Information Technology (SEIT) Univiersity of New South Wales , Australian Defence Force Academy , Canberra ACT 2600 Kamran Shafi, Hussein A. Abbass, \"A Methodology to Evaluate Supervised Learning Algorithms for Intrusion Detection\", Weiping Zhu School of Engineering and Information Technology (SEIT) Univiersity of New South Wales, Australian Defence Force Academy, Canberra ACT 2600"},{"volume-title":"Department of Computer Science and Information Engineering","author":"Lin Chin-Jen","key":"e_1_3_2_1_6_1","unstructured":"Chin-Jen Lin , Formulations of Support Vector Machines: A Note from an Optimization Point of View , Department of Computer Science and Information Engineering , National Taiwan University Chin-Jen Lin, Formulations of Support Vector Machines: A Note from an Optimization Point of View, Department of Computer Science and Information Engineering, National Taiwan University"},{"issue":"5","key":"e_1_3_2_1_7_1","first-page":"24","article-title":"HPING Tutorial","volume":"1","author":"Bogaerts Philippe","year":"2003","unstructured":"Philippe Bogaerts , Alias Xxradar , \" HPING Tutorial \" By. Version 1 . 5 24 - 08 - 2003 . Philippe Bogaerts, Alias Xxradar, \"HPING Tutorial \"By. Version 1.5 24-08-2003.","journal-title":"By. Version"},{"key":"e_1_3_2_1_8_1","unstructured":"Detecting The Unknown With Snort And The Statistical Packet Anomaly Detection Engine (Spade)Simon Biles Computer Security Online Ltd.  Detecting The Unknown With Snort And The Statistical Packet Anomaly Detection Engine (Spade)Simon Biles Computer Security Online Ltd."},{"volume-title":"Department of Computer Science","author":"Hsu Chih-Wei","key":"e_1_3_2_1_9_1","unstructured":"Chih-Wei Hsu , Chih-Chung Chang , and Chih-Jen Lin , \" A Practical Guide to Support Vector Classification\" , Department of Computer Science , National Taiwan University , Taipei 106, Taiwan Chih-Wei Hsu, Chih-Chung Chang, and Chih-Jen Lin, \"A Practical Guide to Support Vector Classification\", Department of Computer Science, National Taiwan University, Taipei 106, Taiwan"}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"location":"Kollam India","acronym":"SECURIT '12"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490453"}},"subtitle":["pre-processor plug-in using support vector machine algorithm for Snort"],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":9,"alternative-id":["10.1145\/2490428.2490453","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490453","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}