{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:41:21Z","timestamp":1776811281921,"version":"3.51.2"},"reference-count":18,"publisher":"European Society of Computational Methods in Sciences and Engineering","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2020,7,10]]},"DOI":"10.3233\/jcm-193874","type":"journal-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T14:11:46Z","timestamp":1569939106000},"page":"427-434","source":"Crossref","is-referenced-by-count":2,"title":["Security precautionary technology for enterprise information resource database based on genetic algorithm in age of big data"],"prefix":"10.66113","volume":"20","author":[{"given":"Guiping","family":"Chen","sequence":"first","affiliation":[]}],"member":"55691","reference":[{"key":"10.3233\/JCM-193874_ref1","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.4028\/www.scientific.net\/AMR.1044-1045.1397","article-title":"The design of the enterprise network security solutions","volume":"1044\u20131045","author":"Liu","year":"2014","journal-title":"Advanced Materials Research"},{"issue":"99","key":"10.3233\/JCM-193874_ref2","first-page":"2","article-title":"An SDN\/NFV-enabled enterprise network architecture offering fine-grained security policy enforcement","author":"Lorenz","year":"2017","journal-title":"IEEE Communications Magazine"},{"key":"10.3233\/JCM-193874_ref3","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.4028\/www.scientific.net\/AMM.568-570.1384","article-title":"Network security management system based on digital China","volume":"568\u2013570","author":"Xu","year":"2014","journal-title":"Applied Mechanics and Materials"},{"key":"10.3233\/JCM-193874_ref4","first-page":"3281","article-title":"Survey of network security situation awareness and key technologies","volume":"269","author":"Xuan","year":"2017","journal-title":"Electronic Test"},{"key":"10.3233\/JCM-193874_ref5","doi-asserted-by":"crossref","first-page":"888","DOI":"10.4028\/www.scientific.net\/AMM.596.888","article-title":"The network security system research based on intrusion detection","volume":"596","author":"Qian","year":"2014","journal-title":"Applied Mechanics and Materials"},{"issue":"1","key":"10.3233\/JCM-193874_ref6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/s40537-015-0013-4","article-title":"Intrusion detection and big heterogeneous data: a survey","volume":"2","author":"Zuech","year":"2015","journal-title":"Journal of Big Data"},{"key":"10.3233\/JCM-193874_ref7","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.asoc.2014.01.028","article-title":"A novel hybrid KPCA and SVM with GA model for intrusion detection","volume":"18","author":"Kuang","year":"2014","journal-title":"Applied Soft Computing Journal"},{"issue":"9","key":"10.3233\/JCM-193874_ref8","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.measurement.2014.04.034","article-title":"D-FICCA: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks","volume":"55","author":"Shamshirband","year":"2014","journal-title":"Measurement"},{"key":"10.3233\/JCM-193874_ref9","doi-asserted-by":"crossref","unstructured":"B.S.M. Hosseini et al., A new intrusion detection approach using PSO based multiple criteria linear programming, Procedia Computer Science 55 (2015), 23-1-237.","DOI":"10.1016\/j.procs.2015.07.040"},{"issue":"4","key":"10.3233\/JCM-193874_ref10","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1007\/s12204-014-1524-4","article-title":"Intrusion detection model with twin support vector machines","volume":"19","author":"He","year":"2014","journal-title":"Journal of Shanghai Jiaotong University"},{"key":"10.3233\/JCM-193874_ref11","doi-asserted-by":"crossref","first-page":"946","DOI":"10.4028\/www.scientific.net\/AMM.631-632.946","article-title":"Research and implementation of intrusion detection based genetic algorithm","volume":"631\u2013632","author":"Cui","year":"2014","journal-title":"Applied Mechanics and Materials"},{"issue":"5","key":"10.3233\/JCM-193874_ref12","first-page":"153","article-title":"The research and application of multi-firewall technology in enterprise network security","volume":"9","author":"Li","year":"2015","journal-title":"Computer Applications & Software"},{"key":"10.3233\/JCM-193874_ref13","doi-asserted-by":"crossref","unstructured":"K.S. Desale and R. Ade, Genetic algorithm based feature selection approach for effective intrusion detection system, in: International Conference on Computer Communication and Informatics, 2015, pp. 1\u20136.","DOI":"10.1109\/ICCCI.2015.7218109"},{"key":"10.3233\/JCM-193874_ref14","doi-asserted-by":"crossref","first-page":"965","DOI":"10.4028\/www.scientific.net\/AMR.1044-1045.965","article-title":"A corporate computer network security system design and implementation","volume":"1044\u20131045","author":"Jiang","year":"2014","journal-title":"Advanced Materials Research"},{"issue":"7","key":"10.3233\/JCM-193874_ref15","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.future.2013.06.027","article-title":"Mining, the network data for intrusion detection through combining SVMs with ant colony networks","volume":"37","author":"Feng","year":"2014","journal-title":"Journal of Future Generation Computer Systems"},{"issue":"2","key":"10.3233\/JCM-193874_ref16","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.3233\/JCM-193874_ref17","doi-asserted-by":"crossref","unstructured":"M.J. Kang and J.W. Kang, A novel intrusion detection method using deep neural network for in-vehicle network security, in: Vehicular Technology Conference, 2016, pp. 1\u20135.","DOI":"10.1109\/VTCSpring.2016.7504089"},{"issue":"3","key":"10.3233\/JCM-193874_ref18","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s11633-014-0870-x","article-title":"Genetic algorithm with variable length chromosomes for network intrusion detection","volume":"12","author":"Pawar","year":"2015","journal-title":"International Journal of Automation & Computing"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-193874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:05:57Z","timestamp":1776809157000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-193874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,10]]},"references-count":18,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jcm-193874","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,10]]}}}