{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:20:13Z","timestamp":1759962013661,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377644.3377660","type":"proceedings-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T08:16:17Z","timestamp":1582704977000},"page":"84-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["The Detection of Network Intrusion Based on Improved Adaboost Algorithm"],"prefix":"10.1145","author":[{"given":"Quanmin","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]},{"given":"Xuan","family":"Wei","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection","author":"Mukkamala S.","year":"2005","unstructured":"Mukkamala , S. and A.H. Sung , Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection . 2005 . Mukkamala, S. and A.H. Sung, Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection. 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.008"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Systems & Informatics.","author":"Qi M.","year":"2012","unstructured":"Qi , M. , Y. Chen and Y. Zhang . Incremental SVM algorithm to intrusion detection base on boundary areas . in International Conference on Systems & Informatics. 2012 . Qi, M., Y. Chen and Y. Zhang. Incremental SVM algorithm to intrusion detection base on boundary areas. in International Conference on Systems & Informatics. 2012."},{"key":"e_1_3_2_1_5_1","first-page":"66","author":"Hu W.","year":"2013","unstructured":"Hu , W. , et al. , Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection. IEEE Transactions on Cybernetics , 2013 . 44(1): p. 66 -- 82 . Hu, W., et al., Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection. IEEE Transactions on Cybernetics, 2013. 44(1): p. 66--82.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"e_1_3_2_1_6_1","volume-title":"Analysis of discrete binary particle swarm optimization [J]","author":"Liu Jianhua","year":"2011","unstructured":"Liu Jianhua , Yang Ronghua, Sun Shuihua. Analysis of discrete binary particle swarm optimization [J] . Journal of Nanjing University ( natural science), 2011 ,47(05):504--514. Liu Jianhua, Yang Ronghua, Sun Shuihua. Analysis of discrete binary particle swarm optimization [J]. Journal of Nanjing University (natural science),2011,47(05):504--514."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2519914"},{"key":"e_1_3_2_1_9_1","unstructured":"Elngar AA Mohamed DAEA Ghaleb FFM. A realtime anomaly network intrusion detection system with high accuracy. Information Sciences Letters 2013;2(2): 49--56.  Elngar AA Mohamed DAEA Ghaleb FFM. A realtime anomaly network intrusion detection system with high accuracy. Information Sciences Letters 2013;2(2): 49--56."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Kim B-J Kim IK. Robust real-time intrusion detection system. International Journal of Information Processing System 2005; 1(1): 9--13.  Kim B-J Kim IK. Robust real-time intrusion detection system. International Journal of Information Processing System 2005; 1(1): 9--13.","DOI":"10.3745\/JIPS.2005.1.1.009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1074"},{"key":"e_1_3_2_1_12_1","volume-title":"Neural Information Processing","author":"Boughaci D","year":"2012","unstructured":"Boughaci D , Kadi MDE , Kada M. Fuzzy particle swarm optimization for intrusion detection , Neural Information Processing , Springer Berlin Heidelberg , 2012 ;541--548. Boughaci D, Kadi MDE, Kada M. Fuzzy particle swarm optimization for intrusion detection, Neural Information Processing, Springer Berlin Heidelberg, 2012;541--548."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Yeung D-Y Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 2003; 36(1): 229--243.  Yeung D-Y Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 2003; 36(1): 229--243.","DOI":"10.1016\/S0031-3203(02)00026-2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.06.066"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/846183.846201"}],"event":{"name":"ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy","sponsor":["NJU Nanjing University"],"location":"Nanjing China","acronym":"ICCSP 2020"},"container-title":["Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377644.3377660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:53Z","timestamp":1750203893000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377644.3377660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":16,"alternative-id":["10.1145\/3377644.3377660","10.1145\/3377644"],"URL":"https:\/\/doi.org\/10.1145\/3377644.3377660","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}