{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:22Z","timestamp":1750221082411,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T00:00:00Z","timestamp":1539129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,10]]},"DOI":"10.1145\/3286606.3286805","type":"proceedings-article","created":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T19:12:50Z","timestamp":1544814770000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Novel Framework Based on Genetic Algorithm and Simulated Annealing Algorithm for Optimization of BP Neural Network Applied to Network IDS"],"prefix":"10.1145","author":[{"given":"Zouhair","family":"Chiba","sequence":"first","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Noreddine","family":"Abghour","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Khalid","family":"Moussaid","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Amina","family":"El Omri","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]},{"given":"Mohamed","family":"Rida","sequence":"additional","affiliation":[{"name":"LIMSAD Labs, Hassan II University of Casablanca, Casablanca, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2018,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"McAfee Company. McAfee Labs 2018 Threats Predictions Report. https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/2018-threats-predictions.  McAfee Company. McAfee Labs 2018 Threats Predictions Report. https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/2018-threats-predictions."},{"key":"e_1_3_2_1_2_1","unstructured":"SonicWall Enterprise. 2018 SonicWall Annual Threat Report. https:\/\/cdn.sonicwall.com\/sonicwall.com\/media\/pdfs\/resources\/2018-snwl-cyber-threat-report.pdf.  SonicWall Enterprise. 2018 SonicWall Annual Threat Report. https:\/\/cdn.sonicwall.com\/sonicwall.com\/media\/pdfs\/resources\/2018-snwl-cyber-threat-report.pdf."},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"176","article-title":"Another fuzzy anomaly detection system based on ant clustering algorithm. IEICE Transactions on Fundamentals of Electronics","volume":"100","author":"Aminanto M. E.","year":"2017","unstructured":"Aminanto , M. E. , Kim , H. , Kim , K. M. , Kim , K . Another fuzzy anomaly detection system based on ant clustering algorithm. IEICE Transactions on Fundamentals of Electronics , Communications and Computer Sciences , 100 ( 1 ) ( 2017 ), 176 -- 183 . Aminanto, M. E., Kim, H., Kim, K. M., Kim, K. Another fuzzy anomaly detection system based on ant clustering algorithm. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 100(1) (2017), 176--183.","journal-title":"Communications and Computer Sciences"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6875-1_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49145-5_24"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2526-3_60"},{"key":"e_1_3_2_1_7_1","volume-title":"Frontier Computing. FC","author":"Ma T.","year":"2016","unstructured":"Ma , T. , Yu , Y. , Wang , F. , Zhang , Q. , Chen , X. A Hybrid Methodologies for Intrusion Detection Based Deep Neural Network with Support Vector Machine and Clustering Technique . In: Yen, N., Hung, J. (eds.) Frontier Computing. FC 2016 . Lecture Notes in Electrical Engineering, 422, 123--134. Springer , Singapore, Singapore (2018). Ma, T., Yu, Y., Wang, F., Zhang, Q., Chen, X. A Hybrid Methodologies for Intrusion Detection Based Deep Neural Network with Support Vector Machine and Clustering Technique. In: Yen, N., Hung, J. (eds.) Frontier Computing. FC 2016. Lecture Notes in Electrical Engineering, 422, 123--134. Springer, Singapore, Singapore (2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"Networking and Computers. ICSINC 2017","author":"Chang C.","year":"2018","unstructured":"Chang , C. , Sun , X. , Chen , D. , Wang , C. Application of Back Propagation Neural Network with Simulated Annealing Algorithm in Network Intrusion Detection Systems. In: Sun, S., Chen, N., Tian, T. (eds.) Signal and Information Processing , Networking and Computers. ICSINC 2017 . Lecture Notes in Electrical Engineering, 473, 172--180. Springer, Singapore Singapore , ( 2018 ). Chang, C., Sun, X., Chen, D., Wang, C. Application of Back Propagation Neural Network with Simulated Annealing Algorithm in Network Intrusion Detection Systems. In: Sun, S., Chen, N., Tian, T. (eds.) Signal and Information Processing, Networking and Computers. ICSINC 2017. Lecture Notes in Electrical Engineering, 473, 172--180. Springer, Singapore Singapore, (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.023"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5120\/4823-7074"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2809079"},{"key":"e_1_3_2_1_12_1","unstructured":"MIT Lincoln Labs. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html.  MIT Lincoln Labs. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1964-2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5828-8_60"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/3285084"}],"event":{"name":"SCA '18: 3rd International Conference on Smart City Applications","acronym":"SCA '18","location":"Tetouan Morocco"},"container-title":["Proceedings of the 3rd International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286606.3286805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286606.3286805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:42Z","timestamp":1750208262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286606.3286805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,10]]},"references-count":16,"alternative-id":["10.1145\/3286606.3286805","10.1145\/3286606"],"URL":"https:\/\/doi.org\/10.1145\/3286606.3286805","relation":{},"subject":[],"published":{"date-parts":[[2018,10,10]]},"assertion":[{"value":"2018-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}