{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:06Z","timestamp":1755900606644,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangzhou Science and Technology Program Project ?Research on Feature Engineering Technology and Machine Learning algorithm Applied in the Intrusion Detection System?","award":["202102080586"],"award-info":[{"award-number":["202102080586"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3617184.3623454","type":"proceedings-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T14:41:42Z","timestamp":1703774502000},"page":"166-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Maximal Information Coefficient-based Feature Selection Method for Intrusion Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5308-467X","authenticated-orcid":false,"given":"Xibin","family":"Sun","sequence":"first","affiliation":[{"name":"Guangdong Polytechnic of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8070-6457","authenticated-orcid":false,"given":"Wenting","family":"Li","sequence":"additional","affiliation":[{"name":"Guizhou University of Commerce, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3231-8219","authenticated-orcid":false,"given":"Jiwei","family":"Qiu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3890-1528","authenticated-orcid":false,"given":"Di","family":"Han","sequence":"additional","affiliation":[{"name":"Guangdong University of Finance, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,28]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1126\/science.1205438"},{"issue":"1","key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/3990386","article-title":"Bridging the last-mile gap in network security via generating intrusion-specific detection patterns through machine learning","volume":"2022","author":"Sun X. B.","year":"2022","unstructured":"X. B. Sun, D. Zhang, H. O. Qin, and J. H. Tang, \u201cBridging the last-mile gap in network security via generating intrusion-specific detection patterns through machine learning,\u201d Security and Communication Networks, vol. 2022, no. 1, pp. 1-20, 2022.","journal-title":"Security and Communication Networks"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/72.298224"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.jnca.2011.01.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/72.977291"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-40597-6_21"},{"volume-title":"A Filter feature selection algorithm based on mutual information for intrusion detection","author":"Zhao F.","unstructured":"F. Zhao, J. Y. Zhao, X. X. Niu, and Y. Xin, \u201cA Filter feature selection algorithm based on mutual information for intrusion detection\u201d, applied sciences, vol. 8, no. 9, pp. 15-35, 2018.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.procs.2020.03.438"},{"key":"e_1_3_2_1_9_1","first-page":"177","volume-title":"International conference on distributed computing systems workshops","author":"Jarrah Al.","year":"2014","unstructured":"Al. Jarrah, A. Siddiqui, and M. Elsalamouny, \u201cMachine-learning-based feature selection techniques for large-scale network intrusion detection,\u201d International conference on distributed computing systems workshops, pp. 177-181, 2014."},{"key":"e_1_3_2_1_10_1","volume-title":"Computers & Security","author":"Selvakumar B.","year":"2018","unstructured":"B. Selvakumar, and K. Muneeswaran, \u201cFirefly algorithm based Feature Selection for Network Intrusion Detection,\u201d Computers & Security, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.jisa.2018.11.007"},{"issue":"15","key":"e_1_3_2_1_12_1","article-title":"IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset","volume":"10","author":"Yin Y.","year":"2023","unstructured":"Y. Yin, J. Jang-Jaccard, and W. Xu, \u201cIGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset,\u201d J Big Data, vol. 10, no. 15, Feb 2023.","journal-title":"J Big Data"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/CISDA.2009.5356528"},{"issue":"1","key":"e_1_3_2_1_14_1","first-page":"1","article-title":"LNNLSKH: A feature selection method for network intrusion detection","volume":"2021","author":"Xin L.","year":"2021","unstructured":"L. Xin, Y. Peng, J. Yiming, and L. Tian, \u201cLNNLSKH: A feature selection method for network intrusion detection,\u201d Security and Communication Networks, vol. 2021, no. 1, pp. 1-22, 2021.","journal-title":"Security and Communication Networks"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/CEC.2017.7969325"}],"event":{"acronym":"ICCSIE 2023","name":"ICCSIE 2023: 8th International Conference on Cyber Security and Information Engineering","location":"Putrajaya Malaysia"},"container-title":["Proceedings of the 8th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617184.3623454","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617184.3623454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:56:08Z","timestamp":1755899768000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617184.3623454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":15,"alternative-id":["10.1145\/3617184.3623454","10.1145\/3617184"],"URL":"https:\/\/doi.org\/10.1145\/3617184.3623454","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2023-12-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}