{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T02:45:35Z","timestamp":1769049935832,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":14,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3335484.3335488","type":"proceedings-article","created":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T16:54:49Z","timestamp":1562604889000},"page":"125-129","source":"Crossref","is-referenced-by-count":7,"title":["Intrusion Detection Based on Approximate Information Entropy for Random Forest Classification"],"prefix":"10.1145","author":[{"given":"Le","family":"Yang","sequence":"first","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]},{"given":"Manchun","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]},{"given":"Yongcheng","family":"Duan","sequence":"additional","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]},{"given":"Xue","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Information Technology and Network Security, People's Public Security University of China, Beijing, China"}]}],"member":"320","reference":[{"key":"key-10.1145\/3335484.3335488-1","unstructured":"Anderson j p. Computer Security Threat Monitoring and Surveillance[R]. Fort Washington: James P Anderson Co, 1980."},{"key":"key-10.1145\/3335484.3335488-2","unstructured":"Cao Zhengfeng, Xie Bangchang, Ji Hong. A Hybrid Algorithm for Random Forests[J]. Statistics & Decision Making, 2014(04): 7--9."},{"key":"key-10.1145\/3335484.3335488-3","unstructured":"Chang Gang, Luo Zuomin. Design of Intrusion Detection System Based on Clustering Algorithm[J].Automation & Instrumentation, 2018(09): 110--113."},{"key":"key-10.1145\/3335484.3335488-4","unstructured":"Wei Jintai, Gao Wei. Research on Intrusion Detection System Based on Information Gain and Random Forest Classifier[J]. 2018,39(01): 74--79+88."},{"key":"key-10.1145\/3335484.3335488-5","unstructured":"Ma Zhanfei, Yang Jin, Jin Yi, Bian Qi. Network Intrusion Detection Method Based on IQPSO-IDE Algorithm[J]. Computer Engineering and Applications. 2018(2)1--10."},{"key":"key-10.1145\/3335484.3335488-6","unstructured":"Guo Jian. Research on the acquisition technology of situational factors in network security situational awareness [D]. Northeastern University, 2011."},{"key":"key-10.1145\/3335484.3335488-7","unstructured":"Lai Jibao, Wang Ying, Wang Huiqiang, Zheng Fengbin, Zhou Bing. Research on the Structure of Network Security Situation Awareness System Based on Multi-source Heterogeneous Sensors[J]. Computer Science,2011,38(03): 144--149+158."},{"key":"key-10.1145\/3335484.3335488-8","unstructured":"Lin Wei-ning, Chen Ming-zhi, ZHAN Yun-qing, LIU Chuan-xi. Research on Intrusion Detection Algorithm Based on PCA and Random Forest Classification[J]. Information Network Security,2017(11): 50--54."},{"key":"key-10.1145\/3335484.3335488-9","unstructured":"Kwok SW, Carter C. Multiple decision trees [EB\/OL].[2018-01-31].https:\/\/arxiv.org\/abs\/1304.2363."},{"key":"key-10.1145\/3335484.3335488-10","doi-asserted-by":"crossref","unstructured":"Ho TK. The random subspace method for constructing decision forests [J]. IEEE transactions on pattern analysis and machine intelligence, 1998, 20(8): 832--44","DOI":"10.1109\/34.709601"},{"key":"key-10.1145\/3335484.3335488-11","doi-asserted-by":"crossref","unstructured":"Quinlan JR. Induction of decision trees[J]. Machine learning, 1986, 1(1): 81--106","DOI":"10.1007\/BF00116251"},{"key":"key-10.1145\/3335484.3335488-12","unstructured":"Quinlan JR. C4. 5: programs for machine learning[M].Elsevier, 2014"},{"key":"key-10.1145\/3335484.3335488-13","unstructured":"Breiman L, Friedman J, Stone C J, et al. Classification and Regression Trees [M]. CRC press, 1984"},{"key":"key-10.1145\/3335484.3335488-14","unstructured":"Zhai Ben, Wang Mengdi. Bayesian Situational Feature Extraction Based on Information Gain[J]. Information Network Security, 2017(09): 54--57."}],"event":{"name":"the 2019 4th International Conference","location":"Guangzhou, China","acronym":"ICBDC 2019","number":"4","sponsor":["Shenzhen University","Sun Yat-Sen University"],"start":{"date-parts":[[2019,5,10]]},"end":{"date-parts":[[2019,5,12]]}},"container-title":["Proceedings of the 2019 4th International Conference on Big Data and Computing  - ICBDC 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3335484.3335488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3335488&ftid=2070083&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:19Z","timestamp":1750206379000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3335484.3335488"}},"subtitle":[],"proceedings-subject":"Big Data and Computing","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1145\/3335484.3335488","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}