{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:56:50Z","timestamp":1730343410656,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,27]]},"DOI":"10.23919\/fruct50888.2021.9347629","type":"proceedings-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T18:51:14Z","timestamp":1618253474000},"page":"96-102","source":"Crossref","is-referenced-by-count":6,"title":["Reducing the Dimension of Input Data for IDS by Using Match Analysis"],"prefix":"10.23919","author":[{"given":"Sergey","family":"Erokhin","sequence":"first","affiliation":[{"name":"Moscow Technical University of Communications and Informatics,Moscow,Russia"}]},{"given":"Boris","family":"Borisenko","sequence":"additional","affiliation":[{"name":"Moscow Technical University of Communications and Informatics,Moscow,Russia"}]},{"given":"Aleksander","family":"Fadeev","sequence":"additional","affiliation":[{"name":"Moscow Technical University of Communications and Informatics,Moscow,Russia"}]}],"member":"263","reference":[{"journal-title":"Distances between Clustering Hierarchical Clustering","year":"0","key":"ref31"},{"journal-title":"Algorithm of singular matrix decomposition","year":"0","author":"safonova","key":"ref30"},{"key":"ref10","article-title":"About the possibility of using the mechanism of the hidden Markovsky models in the information intrusion detection systems (in Russian)","author":"anikeev","year":"2004","journal-title":"Proceedings of the VI International scientific-practical conference &#x201C;Information security"},{"key":"ref11","article-title":"Multi-agent technologies of complex information protection in telecommunication systems","author":"gorodetsky","year":"2000","journal-title":"ISINAS Proceedings"},{"key":"ref12","first-page":"141","article-title":"Features of creating data sets for training intrusion detection systems based on machine learning methods","author":"nikolskaya","year":"2019","journal-title":"Science of the Present and Future VII"},{"key":"ref13","first-page":"7","article-title":"Application of Correspondence Analysis Method for Optimization of Attribute Combinations in Data Sets","author":"burlakov","year":"2018","journal-title":"PNIPU Bulletin Electrotechnics Information Technologies Control Systems"},{"journal-title":"NIST\/SEMATECH e-Handbook of Statistical Methods","year":"2013","author":"natrella","key":"ref14"},{"key":"ref15","article-title":"Practical statistics for professionals","author":"bruce","year":"2018","journal-title":"Data Science M BHV-Peterburg"},{"journal-title":"Secondary Analysis of Electronic Health Records","year":"0","author":"matthieu","key":"ref16"},{"journal-title":"Statistics Methods and Applications A Comprehensive Reference for Science Industry and Data Mining","year":"2006","author":"hill","key":"ref17"},{"key":"ref18","first-page":"4","author":"ayvazyan","year":"1989","journal-title":"Applied Statistics Classification and Reduction of Dimensionality"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3138\/9781487577995"},{"journal-title":"Computation of the Singular Value Decomposition","year":"0","author":"cline","key":"ref28"},{"key":"ref4","first-page":"25","article-title":"On the use of the apparatus of the theory of fuzzy sets in the analysis of information security risks","author":"medvedev","year":"2011","journal-title":"Bulletin of the Moscow State Technical University N E Bauman Series &#x201C;Instrument Engineering&#x201D;"},{"key":"ref27","article-title":"Matrix Computing","author":"golub","year":"1999","journal-title":"Trans from English"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2019.8711960"},{"key":"ref6","article-title":"Expert systems application for solving the information security problems","volume":"9","author":"boltunov","year":"2016","journal-title":"Int J of Research"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/9781108380690"},{"key":"ref5","article-title":"Application of artificial neural networks in intrusion detection systems","volume":"9","author":"frolov","year":"2018","journal-title":"System Administrator magazine"},{"key":"ref8","first-page":"57","article-title":"The analysis of models of information protection systems on the base of modified petri networks","author":"yakhontov","year":"2012","journal-title":"Scientific and practical journal &#x201C;Modern science topical problems of theory and practice &#x201D; Series &#x201D;Natural-technical sciences&#x201D;"},{"key":"ref7","article-title":"Analysis of the mathematical apparatus and methods used to assess the safety of objects of informatization","author":"atamanov","year":"2018","journal-title":"International scientific and methodological conference &#x201C;Problems of modern agricultural education content technology quality"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SYNCHROINFO.2019.8814097"},{"key":"ref9","first-page":"6","article-title":"Modeling of information security systems. Graph theory application","author":"kurilov","year":"2016","journal-title":"Technical sciences theory and practice materials of the III Intern scientific conf"},{"key":"ref1","article-title":"Application of methods of game theory in intrusion detection systems","author":"basalova","year":"2017","journal-title":"Izvestia of the Tula state University Technical Sciences"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4135\/9780857020994.n11"},{"journal-title":"Correspondence Analysis in Practice","year":"2016","author":"greenacre","key":"ref22"},{"journal-title":"Multiple Correspondence Analysis","year":"0","author":"abdi","key":"ref21"},{"key":"ref24","first-page":"137","article-title":"Applied correspondence analysis: An introduction","volume":"121","author":"clausen","year":"1998","journal-title":"Sage university papers series Quantitative applications in the social sciences"},{"journal-title":"The Use of Correspondence Analysis in the Exploration of Health Survey Data","year":"0","author":"greenacre","key":"ref23"},{"journal-title":"Singular Value Decomposition Tutorial","year":"0","author":"baker","key":"ref26"},{"journal-title":"Reducing the data description dimension Main component method","year":"0","key":"ref25"}],"event":{"name":"2021 28th Conference of Open Innovations Association (FRUCT)","start":{"date-parts":[[2021,1,27]]},"location":"Moscow, Russia","end":{"date-parts":[[2021,1,29]]}},"container-title":["2021 28th Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9347567\/9347543\/09347629.pdf?arnumber=9347629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T17:34:14Z","timestamp":1643391254000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9347629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,27]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/fruct50888.2021.9347629","relation":{},"subject":[],"published":{"date-parts":[[2021,1,27]]}}}