{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:46:06Z","timestamp":1764783966775,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,24]],"date-time":"2017-02-24T00:00:00Z","timestamp":1487894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,24]]},"DOI":"10.1145\/3055635.3056595","type":"proceedings-article","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T18:46:30Z","timestamp":1497465990000},"page":"253-257","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Cluster Based Ensemble Classification for Intrusion Detection System"],"prefix":"10.1145","author":[{"given":"M. A.","family":"Jabbar","sequence":"first","affiliation":[{"name":"Vardhaman College of Engineering, Hyderabad, Telangana, India"}]},{"given":"Rajanikanth","family":"Aluvalu","sequence":"additional","affiliation":[{"name":"Vardhaman College of Engineering, Hyderabad, Telangana, India"}]},{"given":"S. Sai Satyanarayana","family":"Reddy","sequence":"additional","affiliation":[{"name":"Vardhaman College of Engineering, Hyderabad, Telangana, India"}]}],"member":"320","published-online":{"date-parts":[[2017,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"628","volume-title":"ISDA2012","author":"Jabbar M. A.","year":"2012","unstructured":"M. A. Jabbar , deekshatulu B L , Priti Chandra ,\" Prediction of risk score for heart disease using associative classification and hybrid feature subset selection,\" IEEE , ISDA2012 , pp. 628 -- 634 , ( 2012 ) M. A. Jabbar, deekshatulu B L, Priti Chandra,\" Prediction of risk score for heart disease using associative classification and hybrid feature subset selection,\" IEEE, ISDA2012, pp. 628--634, (2012)"},{"key":"e_1_3_2_1_2_1","unstructured":"Salima Benqdara et al \" Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System \" JATIT Vol 70 No 3 (2014)  Salima Benqdara et al \" Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System \" JATIT Vol 70 No 3 (2014)"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2014.7057816"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.340"},{"key":"e_1_3_2_1_5_1","first-page":"327","article-title":"Intelligent network intrusion detection system using data mining techniques","author":"Amreen","year":"2016","unstructured":"Amreen sultana, M A Jabbar , \" Intelligent network intrusion detection system using data mining techniques ,\" IEEE , pp. 327 -- 331 ( 2016 ) Amreen sultana, M A Jabbar, \"Intelligent network intrusion detection system using data mining techniques,\" IEEE, pp. 327--331 (2016)","journal-title":"IEEE"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.06.047"},{"key":"e_1_3_2_1_7_1","volume-title":"Springer","author":"Jabbar MA","year":"2016","unstructured":"MA Jabbar , \" A Novel Intelligent Ensemble Classifier for Network Intrusion Detection System ,\" To appear in Scopar 2016 India , Springer , ( 2016 ) MA Jabbar, \"A Novel Intelligent Ensemble Classifier for Network Intrusion Detection System,\" To appear in Scopar 2016 India, Springer, (2016)"},{"key":"e_1_3_2_1_8_1","first-page":"338","volume-title":"ICCC2015","author":"Jabez","year":"2015","unstructured":"Jabez J, \" Intrusion Detection System (Ids) : Anomaly Detection Using Outlier Detection Approach,\" Procedia Computer Science, Vol 48 , ICCC2015 , pp. 338 -- 346 ( 2015 ) Jabez J, \"Intrusion Detection System (Ids): Anomaly Detection Using Outlier Detection Approach,\" Procedia Computer Science, Vol 48, ICCC2015, pp. 338--346 (2015)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1316874.1316881"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2388576.2388596"},{"key":"e_1_3_2_1_11_1","first-page":"124","article-title":"The alternating Decision tree learning algorithm","author":"Y","year":"1999","unstructured":"Freund, Y mason L , \" The alternating Decision tree learning algorithm ,\" In proc of 6th ICM Bled, Slovenia , pp. 124 -- 133 ( 1999 ) Freund, Y mason L, \"The alternating Decision tree learning algorithm,\" In proc of 6th ICM Bled, Slovenia, pp. 124--133 (1999)","journal-title":"proc of 6th ICM Bled, Slovenia"},{"key":"e_1_3_2_1_12_1","unstructured":"Geoffrey holmes \"Multiclass alternation decision trees \" University of Waikato pp. 1--12 last accessed 27-09-2016  Geoffrey holmes \"Multiclass alternation decision trees \" University of Waikato pp. 1--12 last accessed 27-09-2016"},{"key":"e_1_3_2_1_13_1","first-page":"124","volume-title":"ICM Bled","author":"Y","year":"1999","unstructured":"Freund, Y mason L, \" The alternating Decision tree learning algorithm,\" In proc of 6 , ICM Bled , Slovenia , pp. 124 -- 133 ( 1999 ) Freund, Y mason L, \"The alternating Decision tree learning algorithm,\" In proc of 6, ICM Bled, Slovenia, pp. 124--133 (1999)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022648800760"},{"key":"e_1_3_2_1_15_1","first-page":"217","article-title":"Ensemble Classifiers for Network Intrusion detection system","volume":"4","author":"Anazida Zainal","year":"2009","unstructured":"Anazida Zainal et al , \" Ensemble Classifiers for Network Intrusion detection system ,\" Journal of Information Assurance and Security , 4 , pp. 217 -- 225 ( 2009 ) Anazida Zainal et al, \"Ensemble Classifiers for Network Intrusion detection system,\" Journal of Information Assurance and Security, 4, pp. 217--225 (2009)","journal-title":"Journal of Information Assurance and Security"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"A novel SVM-KNN-PSO ensemble method for intrusion detection system","author":"Aburomman Abdulla Amin","year":"2015","unstructured":"Abdulla Amin Aburomman , \" A novel SVM-KNN-PSO ensemble method for intrusion detection system ,\" Applied Soft Computing Journal , pp. 1 -- 13 ( 2015 ) Abdulla Amin Aburomman et al, \"A novel SVM-KNN-PSO ensemble method for intrusion detection system,\" Applied Soft Computing Journal, pp. 1--13 (2015)","journal-title":"Applied Soft Computing Journal"},{"key":"e_1_3_2_1_17_1","unstructured":"GureKDDCup Dataset: http:\/\/www.sc.ehu.es\/acwaldap\/.  GureKDDCup Dataset: http:\/\/www.sc.ehu.es\/acwaldap\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1971.10482356"},{"key":"e_1_3_2_1_19_1","first-page":"193","volume-title":"Journal of classification","author":"Hubert L.","year":"1985","unstructured":"L. Hubert , P Arabie , \" Comparing partitions , Journal of classification , Vol. 2 , pp. 193 -- 218 ( 1985 ) L. Hubert, P Arabie, \"Comparing partitions, Journal of classification, Vol. 2, pp. 193--218 (1985)"},{"key":"e_1_3_2_1_20_1","first-page":"298","article-title":"Anomaly-Based Intrusion Detection through K means Clustering and Naives Bayes Classification","author":"Warusia Yasin","year":"2013","unstructured":"Warusia Yasin et al , \" Anomaly-Based Intrusion Detection through K means Clustering and Naives Bayes Classification ,\" in ICOCI 2013 , pp. 298 -- 303 (2013) Warusia Yasin et al, \"Anomaly-Based Intrusion Detection through K means Clustering and Naives Bayes Classification,\" in ICOCI2013, pp. 298--303 (2013)","journal-title":"ICOCI"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.06.013"}],"event":{"name":"ICMLC 2017: 2017 the 9th International Conference on Machine Learning and Computing","sponsor":["Southwest Jiaotong University"],"location":"Singapore Singapore","acronym":"ICMLC 2017"},"container-title":["Proceedings of the 9th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055635.3056595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055635.3056595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:46Z","timestamp":1750220626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055635.3056595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,24]]},"references-count":21,"alternative-id":["10.1145\/3055635.3056595","10.1145\/3055635"],"URL":"https:\/\/doi.org\/10.1145\/3055635.3056595","relation":{},"subject":[],"published":{"date-parts":[[2017,2,24]]},"assertion":[{"value":"2017-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}