{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:03:05Z","timestamp":1771372985872,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T00:00:00Z","timestamp":1525824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Funds of Science & Technology Research of Guangdong Province, China","award":["2015B010128015"],"award-info":[{"award-number":["2015B010128015"]}]},{"name":"Funds of Science & Technology Research of Guangdong Province, China","award":["2017A040403070"],"award-info":[{"award-number":["2017A040403070"]}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2017A030307027"],"award-info":[{"award-number":["2017A030307027"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1128-z","type":"journal-article","created":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T09:09:15Z","timestamp":1525856955000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":66,"title":["An intrusion detection method for internet of things based on suppressed fuzzy clustering"],"prefix":"10.1186","volume":"2018","author":[{"given":"Liqun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bing","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaoping","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xianjun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"issue":"27","key":"1128_CR1","first-page":"255","volume":"2","author":"XD Hu","year":"2015","unstructured":"XD Hu, ZM Jia, A method of lightweight intrusion detection for the Internet of things. J. Chongqing Univ. Posts Telecommun. 2(27), 255\u2013259 (2015)","journal-title":"J. Chongqing Univ. Posts Telecommun."},{"issue":"39","key":"1128_CR2","first-page":"61","volume":"3","author":"GY Tang","year":"2017","unstructured":"GY Tang, Network intrusion detection method based on constraint fuzzy clustering thought. Natl. Sci. J. Xiangtan Univ. 3(39), 61\u201364 (2017)","journal-title":"Natl. Sci. J. Xiangtan Univ."},{"issue":"37","key":"1128_CR3","first-page":"1271","volume":"12","author":"F Jia","year":"2017","unstructured":"F Jia, LZ Kong, Intrusion detection algorithm based on convolutional neural network. Trans. Beijing Inst. Technol. 12(37), 1271\u20131275 (2017)","journal-title":"Trans. Beijing Inst. Technol."},{"issue":"47","key":"1128_CR4","first-page":"2320","volume":"7","author":"XC Liu","year":"2016","unstructured":"XC Liu, SF Lu, W Zhao, et al., A cloud computing intrusion detection with objective function optimization based on fuzzy C-means clustering algorithm. J. Cent. South Univ. 7(47), 2320\u20132325 (2016)","journal-title":"J. Cent. South Univ."},{"issue":"4","key":"1128_CR5","first-page":"698","volume":"30","author":"GD Li","year":"2015","unstructured":"GD Li, JP Hu, KW Xia, Intrusion detection using relevance vector machine based on cloud particle swarm optimization. Control Decision. 30(4), 698\u2013702 (2015)","journal-title":"Control Decision."},{"issue":"5","key":"1128_CR6","first-page":"1216","volume":"37","author":"YH Yang","year":"2014","unstructured":"YH Yang, HZ Huang, QN Shen, et al., Research on intrusion detection based on incremental GHSOM. Chin. J. Comput.. 37(5), 1216\u20131224 (2014)","journal-title":"Chin. J. Comput.."},{"issue":"9","key":"1128_CR7","first-page":"2201","volume":"38","author":"N Gao","year":"2016","unstructured":"N Gao, L Gao, YY He, Deep belief nets model oriented to intrusion detection system. Syst. Eng. Electron. 38(9), 2201\u20132207 (2016)","journal-title":"Syst. Eng. Electron."},{"issue":"11","key":"1128_CR8","first-page":"118","volume":"36","author":"J Jiang","year":"2015","unstructured":"J Jiang, ZF Wang, TM Chen, et al., Adaptive AP clustering algorithm and its application on intrusion detection. J. Commun. 36(11), 118\u2013126 (2015)","journal-title":"J. Commun."},{"issue":"4","key":"1128_CR9","first-page":"2015127-1","volume":"36","author":"XN Wu","year":"2015","unstructured":"XN Wu, XJ Peng, YY Yang, et al., Two-level feature selection method based on SVM for intrusion detection. J. Commun. 36(4), 2015127-1\u20132015127-8 (2015)","journal-title":"J. Commun."},{"issue":"7","key":"1128_CR10","first-page":"1644","volume":"37","author":"WM Tong","year":"2015","unstructured":"WM Tong, JQ Liang, L Lu, et al., Intrusion detection scheme based node trust value in WSNs. Syst. Eng. Electron 37(7), 1644\u20131649 (2015)","journal-title":"Syst. Eng. Electron"},{"issue":"10","key":"1128_CR11","first-page":"2239","volume":"52","author":"B Wang","year":"2015","unstructured":"B Wang, XW Nie, Multi-criteria mathematical programming based method on network intrusion detection. J. Comput. Res. Dev. 52(10), 2239\u20132246 (2015)","journal-title":"J. Comput. Res. Dev."},{"issue":"3","key":"1128_CR12","first-page":"718","volume":"52","author":"CH Tang","year":"2015","unstructured":"CH Tang, PC Liu, SS Tang, et al., Anomaly intrusion behavior detection based on fuzzy clustering and features selection. J. Comput. Res. Dev. 52(3), 718\u2013728 (2015)","journal-title":"J. Comput. Res. Dev."},{"issue":"5","key":"1128_CR13","first-page":"974","volume":"49","author":"QA Wang","year":"2012","unstructured":"QA Wang, B Chen, Intrusion detection system using CVM algorithm with extensive kernel methods. J. Comput. Res. Dev. 49(5), 974\u2013982 (2012)","journal-title":"J. Comput. Res. Dev."},{"issue":"9","key":"1128_CR14","first-page":"166","volume":"34","author":"L Zhang","year":"2013","unstructured":"L Zhang, ZY Bai, SS Luo, et al., Integrated intrusion detection model based on rough set and artificial immune. J. Commun. 34(9), 166\u2013176 (2013)","journal-title":"J. Commun."},{"issue":"3","key":"1128_CR15","first-page":"498","volume":"50","author":"ZH Tian","year":"2013","unstructured":"ZH Tian, BL Wang, WZ Zhang, et al., Network intrusion detection model based on context verification. J. Comput. Res. Dev. 50(3), 498\u2013508 (2013)","journal-title":"J. Comput. Res. Dev."},{"issue":"6","key":"1128_CR16","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1360\/jos181369","volume":"18","author":"Y Yu","year":"2007","unstructured":"Y Yu, H Huang, An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm. J. Softw. 18(6), 1369\u20131378 (2007)","journal-title":"J. Softw."},{"issue":"2","key":"1128_CR17","first-page":"371","volume":"40","author":"B Liu","year":"2012","unstructured":"B Liu, SX Xia, Y Zhou, et al., A sample-weighted possibilistic fuzzy clustering algorithm. Acta Electron. Sin. 40(2), 371\u2013375 (2012)","journal-title":"Acta Electron. Sin."},{"issue":"12","key":"1128_CR18","first-page":"2122","volume":"31","author":"AG Chen","year":"2016","unstructured":"AG Chen, ST Wang, Fuzzy clustering algorithm based on multiple medoids for large-scale data. Control Decision. 31(12), 2122\u20132130 (2016)","journal-title":"Control Decision."},{"issue":"2","key":"1128_CR19","first-page":"211","volume":"26","author":"ZZ Liang","year":"2013","unstructured":"ZZ Liang, Y Li, SX Xia, et al., Principal component analysis based on L1-norm maximization with Lp-norm constraints. PR AI 26(2), 211\u2013217 (2013)","journal-title":"PR AI"},{"issue":"3","key":"1128_CR20","first-page":"666","volume":"37","author":"Y Ruan","year":"2014","unstructured":"Y Ruan, HW Chen, ZH Liu, et al., Quantum principal component analysis algorithm. Chin. J. Comput 37(3), 666\u2013676 (2014)","journal-title":"Chin. J. Comput"},{"key":"1128_CR21","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"M Ahmed, AN Mahmood, J Hu, A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"1128_CR22","first-page":"1398","volume":"30","author":"Y Chen","year":"2015","unstructured":"Y Chen, An efficient feature selection algorithm toward building lightweight intrusion detection system. Chin. J. Comput. 30(8), 1398\u20131408 (2015)","journal-title":"Chin. J. Comput."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1128-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1128-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1128-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T19:04:45Z","timestamp":1557342285000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1128-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,9]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1128"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1128-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,9]]},"assertion":[{"value":"3 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"113"}}