{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T13:19:40Z","timestamp":1771679980861,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.23919\/itc.2017.8065806","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T20:44:47Z","timestamp":1507841087000},"page":"25-30","source":"Crossref","is-referenced-by-count":41,"title":["Support Vector Machine Meets Software Defined Networking in IDS Domain"],"prefix":"10.23919","author":[{"given":"Luca","family":"Boero","sequence":"first","affiliation":[]},{"given":"Mario","family":"Marchese","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Zappatore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","article-title":"Selection of the best classifier from different datasets using weka","volume":"2","author":"dash","year":"2013","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref31","year":"2017"},{"key":"ref30","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2011.6157418"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.65"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.005"},{"key":"ref13","first-page":"1","article-title":"Adaptive network intrusion detection system using a hybrid approach","author":"karthick","year":"2012","journal-title":"Communication Systems and Networks (COMSNETS) 2012 Fourth International Conference on"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2012.6194493"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2013.01.003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.09.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2836"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046961"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.198"},{"key":"ref28","year":"2017"},{"key":"ref4","first-page":"2","article-title":"Software-defined networks and openflow","volume":"16","author":"stallings","year":"2013","journal-title":"The Internet Protocol Journal"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.44"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2291066"},{"key":"ref29","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2222025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.5"},{"key":"ref9","first-page":"173","article-title":"Performance evaluation study of intrusion detection systems,&#x201D; Procedia Computer Science","volume":"5","author":"alhomoud","year":"2011","journal-title":"the 2nd International Conference on Ambient Systems Networks and Technologies (ANT-2011) \/ The 8th International Conference on Mobile Web Information Systems (MobiWIS 2011)"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/TSMCC.2009.2037978","article-title":"Cimds: adapting postprocessing techniques of associative classification for malware detection","volume":"40","author":"ye","year":"2010","journal-title":"Systems Man and Cybernetics Part C Applications and Reviews IEEE Transactions on"},{"key":"ref20","author":"zamani","year":"2013","journal-title":"Machine Learning in Intrusion Detection"},{"key":"ref22","year":"2016","journal-title":"KDD Cup 1999 data"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2012.6395949"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SACI.2014.6840052"},{"key":"ref23","first-page":"1242","article-title":"Study on classification algorithms for network intrusion systems","volume":"9","author":"saravanan","year":"2012","journal-title":"Journal of Communication and Computer"},{"key":"ref26","year":"2013","journal-title":"Open Networking Foundation"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3225"}],"event":{"name":"2017 29th International Teletraffic Congress (ITC 29)","location":"Genoa","start":{"date-parts":[[2017,9,4]]},"end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 29th International Teletraffic Congress (ITC 29)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8063994\/8065794\/08065806.pdf?arnumber=8065806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T17:08:40Z","timestamp":1581008920000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8065806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/itc.2017.8065806","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}