{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:33:58Z","timestamp":1750221238714,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T00:00:00Z","timestamp":1530835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,6]]},"DOI":"10.1145\/3205651.3207853","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T19:30:44Z","timestamp":1530905444000},"page":"1121-1137","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Bio-inspired approaches to anomaly and intrusion detection"],"prefix":"10.1145","author":[{"given":"Luis","family":"Mart\u00ed","sequence":"first","affiliation":[{"name":"Universidade Federal Fluminense"}]},{"given":"Marc","family":"Schoenauer","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Saclay"}]}],"member":"320","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NSL-KDD dataset. http:\/\/www.unb.ca\/research\/iscx\/dataset\/iscx-NSL-KDD-dataset.html. Accessed: 2016-02-03.  NSL-KDD dataset. http:\/\/www.unb.ca\/research\/iscx\/dataset\/iscx-NSL-KDD-dataset.html. Accessed: 2016-02-03."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1527125.1527138"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/978-3-642-52307-6_8","volume-title":"Multiple Hypothesenpr\u00fcfung\/Multiple Hypotheses Testing","author":"Bergmann B.","year":"1988","unstructured":"Bergmann , B. and Hommel , G . ( 1988 ). Improvements of general multiple test procedures for redundant systems of hypotheses . In Multiple Hypothesenpr\u00fcfung\/Multiple Hypotheses Testing , pages 100 -- 115 . Springer . Bergmann, B. and Hommel, G. (1988). Improvements of general multiple test procedures for redundant systems of hypotheses. In Multiple Hypothesenpr\u00fcfung\/Multiple Hypotheses Testing, pages 100--115. Springer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.08.008"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427469_71"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01181-8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281535"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007413511361"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1774041.1774042"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551188_6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1763756.1763772"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24854-5_30"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939047.1939070"},{"key":"e_1_3_2_1_16_1","volume-title":"ETH Zurich, Switzerland, revised version.","author":"Knowles J.","year":"2006","unstructured":"Knowles , J. , Thiele , L. , and Zitzler , E . ( 2006 ). A Tutorial on the Performance Assessment of Stochastic Multiobjective Optimizers. 214, Computer Engineering and Networks Laboratory (TIK) , ETH Zurich, Switzerland, revised version. Knowles, J., Thiele, L., and Zitzler, E. (2006). A Tutorial on the Performance Assessment of Stochastic Multiobjective Optimizers. 214, Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Switzerland, revised version."},{"key":"e_1_3_2_1_17_1","volume-title":"Genetic programming: On the programming of computers by means of natural selection","author":"Koza J. R.","year":"1992","unstructured":"Koza , J. R. ( 1992 ). Genetic programming: On the programming of computers by means of natural selection , volume 1 . MIT press . Koza, J. R. (1992). Genetic programming: On the programming of computers by means of natural selection, volume 1. MIT press."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45823-6_65"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3071178.3071333"},{"key":"e_1_3_2_1_20_1","volume-title":"Network intrusion detection","author":"Northcutt S.","year":"2002","unstructured":"Northcutt , S. and Novak , J . ( 2002 ). Network intrusion detection . Sams Publishing . Northcutt, S. and Novak, J. (2002). Network intrusion detection. Sams Publishing."},{"key":"e_1_3_2_1_21_1","volume-title":"Animal Farm. Secker and Warburg","author":"Orwell G.","year":"1945","unstructured":"Orwell , G. ( 1945 ). Animal Farm. Secker and Warburg , London, UK . Orwell, G. (1945). Animal Farm. Secker and Warburg, London, UK."},{"key":"e_1_3_2_1_22_1","volume-title":"Lausanne.","author":"Pareto V.","year":"1896","unstructured":"Pareto , V. ( 1896 ). Cours D'\u00c9conomie Politique. F. Rouge , Lausanne. Pareto, V. (1896). Cours D'\u00c9conomie Politique. F. Rouge, Lausanne."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987637.1987640"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01020-0_19"}],"event":{"name":"GECCO '18: Genetic and Evolutionary Computation Conference","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation"],"location":"Kyoto Japan","acronym":"GECCO '18"},"container-title":["Proceedings of the Genetic and Evolutionary Computation Conference Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205651.3207853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205651.3207853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:24Z","timestamp":1750212444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205651.3207853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,6]]},"references-count":24,"alternative-id":["10.1145\/3205651.3207853","10.1145\/3205651"],"URL":"https:\/\/doi.org\/10.1145\/3205651.3207853","relation":{},"subject":[],"published":{"date-parts":[[2018,7,6]]},"assertion":[{"value":"2018-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}