{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:20:30Z","timestamp":1771003230589,"version":"3.50.1"},"reference-count":19,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2019,1,9]]},"DOI":"10.3233\/jcm-180875","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T12:37:08Z","timestamp":1540557428000},"page":"169-178","source":"Crossref","is-referenced-by-count":0,"title":["Collaborative quantum optimization network intrusion detection research"],"prefix":"10.1177","volume":"19","author":[{"given":"Shuhua","family":"Zeng","sequence":"first","affiliation":[{"name":"Hunan Vocational College of Railway Technology, Zhuzhou 412006, Hunan, China"}]},{"given":"Yinxiu","family":"Huang","sequence":"additional","affiliation":[{"name":"Hunan Chemical Vocational Technology College, Zhuzhou 412004, Hunan, China"}]}],"member":"179","reference":[{"issue":"7","key":"10.3233\/JCM-180875_ref1","first-page":"78","article-title":"Research on intrusion detection techniques: A survey","volume":"25","author":"Qing","year":"2004","journal-title":"Journal of China Institute of Communications"},{"key":"10.3233\/JCM-180875_ref2","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1109\/ICACCI.2017.8126009","article-title":"Applying convolutional neural network for network intrusion detection","author":"Vinayakumar","year":"2017","journal-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"},{"key":"10.3233\/JCM-180875_ref3","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1109\/ICACCI.2017.8126018","article-title":"Evaluating effectiveness of shallow and deep networks to intrusion detection system","author":"Vinayakumar","year":"2017","journal-title":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"},{"key":"10.3233\/JCM-180875_ref4","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.cose.2017.10.011","article-title":"Network intrusion detection system based on recursive feature addition and bigram technique","volume":"73","author":"Hamed","year":"2018","journal-title":"Computers and Security"},{"issue":"7","key":"10.3233\/JCM-180875_ref5","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1360\/jos181639","article-title":"Lightweight intrusion detection system based on feature selection","volume":"18","author":"Chen","year":"2007","journal-title":"Journal of Software"},{"issue":"2","key":"10.3233\/JCM-180875_ref6","first-page":"125","article-title":"Intrusion detection based on KPCA AND SVM","volume":"23","author":"Bao","year":"2006","journal-title":"Computer Applications and Software"},{"issue":"13","key":"10.3233\/JCM-180875_ref7","first-page":"257","article-title":"Feature selection method based on mutual information and attribute union theory","volume":"36","author":"HE","year":"2010","journal-title":"Computer Engineering"},{"issue":"2","key":"10.3233\/JCM-180875_ref8","first-page":"144","article-title":"Feature subset selection based on particle swarm optimization algorithm and relevance analysis","volume":"35","author":"Guo","year":"2008","journal-title":"Computer Science"},{"issue":"8","key":"10.3233\/JCM-180875_ref9","first-page":"37","article-title":"Selection and detection of network intrusion feature based on BPSO-SVM","volume":"32","author":"Gao","year":"2006","journal-title":"Computer Engineering"},{"issue":"7","key":"10.3233\/JCM-180875_ref10","first-page":"1261","article-title":"Feature selection of the intrusion detection data based on particle swarm optimization and neighborhood reduction","volume":"47","author":"Chen","year":"2010","journal-title":"Journal of Computer Research and Development"},{"key":"10.3233\/JCM-180875_ref11","first-page":"20","article-title":"Research on internet of things security based on support vector machines with balanced binary decision tree","volume":"8","author":"Zhang","year":"2015","journal-title":"Netinfo Security"},{"issue":"2","key":"10.3233\/JCM-180875_ref12","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s00500-007-0193-8","article-title":"A genetic algorithm based method for feature subset selection","volume":"12","author":"Tan","year":"2008","journal-title":"Soft Computing"},{"issue":"9","key":"10.3233\/JCM-180875_ref13","first-page":"160","article-title":"Intrusion detection system based on combination of immune arithmetic and RBF network","volume":"33","author":"Shi","year":"2007","journal-title":"Computer Engineering"},{"issue":"4","key":"10.3233\/JCM-180875_ref14","first-page":"582","article-title":"Quantum-behaved particle swam optimization algorithm with cooperative approach","volume":"26","author":"Zhou","year":"2011","journal-title":"Control and Decision"},{"key":"10.3233\/JCM-180875_ref15","doi-asserted-by":"crossref","first-page":"1942","DOI":"10.1109\/ICNN.1995.488968","article-title":"Particle swarm optimization","author":"Kennedy","year":"1995","journal-title":"Proceedings of IEEE Int Conf on Neural Network"},{"issue":"2","key":"10.3233\/JCM-180875_ref16","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TEVC.2011.2112662","article-title":"Cooperative coevolving particle swarms for large scale optimization","volume":"16","author":"Li","year":"2012","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"12","key":"10.3233\/JCM-180875_ref18","first-page":"63","article-title":"Distributed intrusion detection research based on neural network","volume":"26","author":"Ma","year":"2006","journal-title":"Journal of Computer Applications"},{"issue":"2","key":"10.3233\/JCM-180875_ref19","first-page":"197","article-title":"Network intrusion intelligent detection algorithm based on adaboost","volume":"41","author":"Tan","year":"2014","journal-title":"Computer Science"},{"issue":"24","key":"10.3233\/JCM-180875_ref20","first-page":"74","article-title":"Network intrusion detection model based on improved artificial fish swarm algorithm and support vector machine","volume":"49","author":"Li","year":"2013","journal-title":"Computer Engineering and Applications"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-180875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:31:43Z","timestamp":1771000303000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-180875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,9]]},"references-count":19,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jcm-180875","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,9]]}}}