{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T14:31:44Z","timestamp":1774276304143,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,9]],"date-time":"2015-10-09T00:00:00Z","timestamp":1444348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,9]]},"DOI":"10.1145\/2811411.2811472","type":"proceedings-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T04:22:54Z","timestamp":1446006174000},"page":"15-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["K-strings algorithm, a new approach based on Kmeans"],"prefix":"10.1145","author":[{"given":"Viet-Hoang","family":"Le","sequence":"first","affiliation":[{"name":"Konkuk University, South Korea"}]},{"given":"Sung-Ryul","family":"Kim","sequence":"additional","affiliation":[{"name":"Konkuk University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SANS Institute. Understanding Intrusion Detection Systems. http:\/\/www.sans.org\/reading-room\/whitepapers\/detection\/understanding-intrusion-detection-systems-337.  SANS Institute. Understanding Intrusion Detection Systems. http:\/\/www.sans.org\/reading-room\/whitepapers\/detection\/understanding-intrusion-detection-systems-337."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_2_1_3_1","first-page":"281","volume-title":"Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability","author":"MacQueen James","year":"1967","unstructured":"James MacQueen . 1967 . Some Methods for classification and Analysis of Multivariate Observations . In Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability . University of California Press. pp. 281 -- 297 . MR 0214227. James MacQueen. 1967. Some Methods for classification and Analysis of Multivariate Observations. In Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability. University of California Press. pp. 281--297. MR 0214227."},{"key":"e_1_3_2_1_4_1","unstructured":"The Third International Knowledge Discovery and Data Mining Tools Competition which was held in conjunction with KDD-99 The Fifth International Conference on Knowledge Discovery and Data Mining. Available at http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html.  The Third International Knowledge Discovery and Data Mining Tools Competition which was held in conjunction with KDD-99 The Fifth International Conference on Knowledge Discovery and Data Mining. Available at http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_3_2_1_5_1","volume-title":"Models for the perception of speech and visual form","author":"Blum A","year":"1967","unstructured":"A transformation for extracting new descriptors of shape H Blum , Models for the perception of speech and visual form , 1967 . Available at http:\/\/pageperso.lif.univ-mrs.fr\/~edouard.thiel\/rech\/1967-blum.pdf A transformation for extracting new descriptors of shape H Blum, Models for the perception of speech and visual form, 1967. Available at http:\/\/pageperso.lif.univ-mrs.fr\/~edouard.thiel\/rech\/1967-blum.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"Ujjwal Maulik Sanghamitra Bandyopadhyay. 2000. Genetic algorithm-based clustering technique. Pattern Recognition. DOI=10.1016\/S0031-3203(99)00137-5.  Ujjwal Maulik Sanghamitra Bandyopadhyay. 2000. Genetic algorithm-based clustering technique. Pattern Recognition. DOI=10.1016\/S0031-3203(99)00137-5."},{"issue":"4","key":"e_1_3_2_1_7_1","first-page":"294","article-title":"Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set","volume":"1","author":"Chandrashekhar A. M.","year":"2012","unstructured":"A. M. Chandrashekhar , K. Raghuveer . 2012 . Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set . International Journal of Information & Network Security (IJINS). Vol. 1 , No. 4 , October 2012, pp. 294 -- 305 . DOI=10.11591\/ijins.v1i4.821 A. M. Chandrashekhar, K. Raghuveer. 2012. Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set. International Journal of Information & Network Security (IJINS). Vol.1, No.4, October 2012, pp. 294--305. DOI=10.11591\/ijins.v1i4.821","journal-title":"International Journal of Information & Network Security (IJINS)."},{"key":"e_1_3_2_1_8_1","article-title":"An Implementation of Intrusion Detection System Using Genetic Algorithm","volume":"4","author":"Hoque Mohammad Sazzadul","year":"2012","unstructured":"Mohammad Sazzadul Hoque , Md. Abdul Mukit , Md. Abu Naser Bikas . 2012 . An Implementation of Intrusion Detection System Using Genetic Algorithm . International Journal of Network Security & Its Applications , Volume 4 , Number 2, pages 109--120, March 2012. DOI=10.5121\/ijnsa.2012.4208 Mohammad Sazzadul Hoque, Md. Abdul Mukit, Md. Abu Naser Bikas. 2012. An Implementation of Intrusion Detection System Using Genetic Algorithm. International Journal of Network Security & Its Applications, Volume 4, Number 2, pages 109--120, March 2012. DOI=10.5121\/ijnsa.2012.4208","journal-title":"International Journal of Network Security & Its Applications"},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Database Theory & Application;Oct2013","author":"Naahid Mohammad","unstructured":"Siddiqui, Mohammad Khubeb; Naahid , Shams. 2013. Analysis of KDD CUP 99 Dataset using Clustering based Data Mining . International Journal of Database Theory & Application;Oct2013 , Vol. 6 Issue 5, p23. DOI= http:\/\/dx.doi.org\/10.14257\/ijdta.2013.6.5.03 10.14257\/ijdta.2013.6.5.03 Siddiqui, Mohammad Khubeb; Naahid, Shams. 2013. Analysis of KDD CUP 99 Dataset using Clustering based Data Mining. International Journal of Database Theory & Application;Oct2013, Vol. 6 Issue 5, p23. DOI= http:\/\/dx.doi.org\/10.14257\/ijdta.2013.6.5.03"},{"key":"e_1_3_2_1_10_1","unstructured":"Division of Science and Mathematics University of Minnesota Morris. Intrusion Detection with Genetic Algorithms and Fuzzy Logic. https:\/\/wiki.umn.edu\/pub\/UmmCSciSeniorSeminar\/Fall2013PapersAndTalks\/cameraReadyCopy-EmmaIreland.pdf  Division of Science and Mathematics University of Minnesota Morris. Intrusion Detection with Genetic Algorithms and Fuzzy Logic. https:\/\/wiki.umn.edu\/pub\/UmmCSciSeniorSeminar\/Fall2013PapersAndTalks\/cameraReadyCopy-EmmaIreland.pdf"},{"key":"e_1_3_2_1_11_1","volume-title":"Advanced Computing (ICoAC), 2013 Fifth International Conference. DOI=10","author":"Univ. Coll IT","year":"2013","unstructured":"Senthilnayaki, B.; Dept. of IT , Univ. Coll . of Eng., Villupuram, India; Venkatalakshmi, K.; Kannan, A. 2013 . An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier . Advanced Computing (ICoAC), 2013 Fifth International Conference. DOI=10 .1109\/ICoAC.2013.6921918 Senthilnayaki, B.; Dept. of IT, Univ. Coll. of Eng., Villupuram, India; Venkatalakshmi, K.; Kannan, A. 2013. An intelligent intrusion detection system using genetic based feature selection and Modified J48 decision tree classifier. Advanced Computing (ICoAC), 2013 Fifth International Conference. DOI=10.1109\/ICoAC.2013.6921918"}],"event":{"name":"RACS '15: International Conference on Research in Adaptive and Convergent Systems","location":"Prague Czech Republic","acronym":"RACS '15","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"]},"container-title":["Proceedings of the 2015 Conference on research in adaptive and convergent systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2811411.2811472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:49Z","timestamp":1750225729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2811411.2811472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,9]]},"references-count":11,"alternative-id":["10.1145\/2811411.2811472","10.1145\/2811411"],"URL":"https:\/\/doi.org\/10.1145\/2811411.2811472","relation":{},"subject":[],"published":{"date-parts":[[2015,10,9]]},"assertion":[{"value":"2015-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}