{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:43:40Z","timestamp":1777704220132,"version":"3.51.4"},"reference-count":10,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,10]]},"abstract":"<jats:p>With the network technology development and the current attention to network security, the intrusion detection technology of the network system research has being regarded more important. The previous system intrusion detection section has not been able to meet and adapt to the needs of the current rapid development of the network era. The construction of the framework of intrusion detection system is our primary job. This research adopts the genetic attribute reduction algorithm based on rough set and neural network intrusion detection system simulation analysis, through the simple computer algorithm and system simulation analysis of intrusion mode simulation model establishment. The results show that the study has made great success.<\/jats:p>","DOI":"10.3233\/jifs-169649","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T13:17:10Z","timestamp":1529068630000},"page":"2937-2942","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Simulation analysis of intrusion detection system based on genetic attribute reduction algorithm and neural network based on rough set theory"],"prefix":"10.1177","volume":"35","author":[{"given":"Xin","family":"Xu","sequence":"first","affiliation":[{"name":"Chongqing College of Electronic Engineering, China"}]}],"member":"179","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.01.010"},{"key":"e_1_3_1_3_2","article-title":"Compulsory coverage network intrusion detection algorithm based on rough set theory","volume":"9480","author":"Wang X.","year":"2016","unstructured":"WangX., Compulsory coverage network intrusion detection algorithm based on rough set theory, Journal of Computational & Theoretical Nanoscience9480\u20139483 (2016).","journal-title":"Journal of Computational & Theoretical Nanoscience"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.10.2553"},{"issue":"4","key":"e_1_3_1_5_2","first-page":"368","article-title":"Intrusion detection based on roughset and artificial immune","volume":"22","author":"Haiyan S.","year":"2016","unstructured":"HaiyanS., JiantaoC.et al., Intrusion detection based on roughset and artificial immune, High Technology Letters22(4) (2016), 368\u2013375.","journal-title":"High Technology Letters"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2015.4671"},{"issue":"24","key":"e_1_3_1_7_2","first-page":"5593","article-title":"Subjective logic application research\u2014Rough set belief rule model and trust evaluation model of the intrusion detection system","volume":"126","author":"Jiao H.","year":"2016","unstructured":"JiaoH., JiaL., DingW.et al., Subjective logic application research\u2014Rough set belief rule model and trust evaluation model of the intrusion detection system, Optik - International Journal for Light and Electron Optics126(24) (2016), 5593\u20135599.","journal-title":"Optik - International Journal for Light and Electron Optics"},{"key":"e_1_3_1_8_2","first-page":"16","article-title":"Research on knowledge acquisition of motorcycleintelligent design system based on rough set","volume":"368","author":"Dai R.","year":"2016","unstructured":"DaiR. and DuanX., Research on knowledge acquisition of motorcycleintelligent design system based on rough set, Computer & Computing Technologies in Agriculture V368 (2016), 16\u201327.","journal-title":"Computer & Computing Technologies in Agriculture V"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2016.0701"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1840-0"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/info6010049"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169649","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169649","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169649","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:40:43Z","timestamp":1777455643000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169649"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["10.3233\/JIFS-169649"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169649","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,14]]}}}