{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:50:52Z","timestamp":1775170252481,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T00:00:00Z","timestamp":1517184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,29]]},"DOI":"10.1145\/3167918.3167951","type":"proceedings-article","created":{"date-parts":[[2018,2,21]],"date-time":"2018-02-21T16:46:16Z","timestamp":1519231576000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":98,"title":["Improving performance of intrusion detection system using ensemble methods and feature selection"],"prefix":"10.1145","author":[{"given":"Ngoc Tu","family":"Pham","sequence":"first","affiliation":[{"name":"Queensland University of Technology, Brisbane, Queensland"}]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Queensland"}]},{"given":"Suriadi","family":"Suriadi","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Queensland"}]},{"given":"Helen","family":"Jeffrey","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Queensland"}]},{"given":"Hassan Fareed M","family":"Lahza","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Queensland"}]}],"member":"320","published-online":{"date-parts":[[2018,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_3_2_1_2_1","first-page":"2481","article-title":"Ensemble neural network and k-NN classifiers for intrusion detection","volume":"5","author":"Chaurasia Shalinee","year":"2014","unstructured":"Shalinee Chaurasia and Anurag Jain . 2014 . Ensemble neural network and k-NN classifiers for intrusion detection . International Journal of Computer Science and Information Technology 5 (2014), 2481 -- 2485 . Shalinee Chaurasia and Anurag Jain. 2014. Ensemble neural network and k-NN classifiers for intrusion detection. International Journal of Computer Science and Information Technology 5 (2014), 2481--2485.","journal-title":"International Journal of Computer Science and Information Technology"},{"key":"e_1_3_2_1_3_1","first-page":"148","article-title":"Experiments with a new boosting algorithm","volume":"96","author":"Freund Yoav","year":"1996","unstructured":"Yoav Freund , Robert E Schapire , 1996 . Experiments with a new boosting algorithm . In Icml , Vol. 96. 148 -- 156 . Yoav Freund, Robert E Schapire, et al. 1996. Experiments with a new boosting algorithm. In Icml, Vol. 96. 148--156.","journal-title":"Icml"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30933-0_20"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2014.02.07"},{"key":"e_1_3_2_1_6_1","volume-title":"Data mining: concepts and techniques","author":"Han Jiawei","unstructured":"Jiawei Han , Jian Pei , and Micheline Kamber . 2011. Data mining: concepts and techniques . Elsevier . Jiawei Han, Jian Pei, and Micheline Kamber. 2011. Data mining: concepts and techniques. Elsevier."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.58871"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IntelliSys.2015.7361264"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Tin Kam Ho. 2002. Multiple classifier combination: Lessons and next steps. In Hybrid methods in pattern recognition. World Scientific 171--198.  Tin Kam Ho. 2002. Multiple classifier combination: Lessons and next steps. In Hybrid methods in pattern recognition . World Scientific 171--198.","DOI":"10.1142\/9789812778147_0007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2695-6_45"},{"key":"e_1_3_2_1_11_1","volume-title":"Combining pattern classifiers: methods and algorithms","author":"Kuncheva Ludmila I","unstructured":"Ludmila I Kuncheva . 2014. Combining pattern classifiers: methods and algorithms ( second ed.). John Wiley & Sons . Ludmila I Kuncheva. 2014. Combining pattern classifiers: methods and algorithms (second ed.). John Wiley & Sons."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.508"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.017"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","year":"2017","unstructured":"NSL-KDD 2017 . NSL-KDD dataset. (2017) . Retrieved September 20, 2017 from http:\/\/www.unb.ca\/cic\/research\/datasets\/nsl.html NSL-KDD 2017. NSL-KDD dataset. (2017). Retrieved September 20, 2017 from http:\/\/www.unb.ca\/cic\/research\/datasets\/nsl.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-015-0388-x"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1523103.1523204"},{"key":"e_1_3_2_1_17_1","volume-title":"Information Management and Applications (SKIMA), 2014 8th International Conference on. IEEE, 1--6.","author":"Pervez Muhammad Shakil","year":"2014","unstructured":"Muhammad Shakil Pervez and Dewan Md Farid . 2014 . Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In Software, Knowledge , Information Management and Applications (SKIMA), 2014 8th International Conference on. IEEE, 1--6. Muhammad Shakil Pervez and Dewan Md Farid. 2014. Feature selection and intrusion classification in NSL-KDD cup 99 dataset employing SVMs. In Software, Knowledge, Information Management and Applications (SKIMA), 2014 8th International Conference on. IEEE, 1--6."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022648800760"},{"key":"e_1_3_2_1_19_1","article-title":"An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set","volume":"99","author":"Shrivas Akhilesh Kumar","year":"2014","unstructured":"Akhilesh Kumar Shrivas and Amit Kumar Dewangan . 2014 . An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set . International Journal of Computer Applications 99 , 15 (2014). Akhilesh Kumar Shrivas and Amit Kumar Dewangan. 2014. An ensemble model for classification of attacks with feature selection based on KDD99 and NSL-KDD data set. International Journal of Computer Applications 99, 15 (2014).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1736481.1736489"}],"event":{"name":"ACSW 2018: Australasian Computer Science Week 2018","location":"Brisband Queensland Australia","acronym":"ACSW 2018","sponsor":["CORE Computing Research and Education"]},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167918.3167951","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167918.3167951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:07Z","timestamp":1750213567000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167918.3167951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,29]]},"references-count":20,"alternative-id":["10.1145\/3167918.3167951","10.1145\/3167918"],"URL":"https:\/\/doi.org\/10.1145\/3167918.3167951","relation":{},"subject":[],"published":{"date-parts":[[2018,1,29]]},"assertion":[{"value":"2018-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}