{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:08Z","timestamp":1738777208340,"version":"3.37.0"},"reference-count":23,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.6.1322-1328","type":"journal-article","created":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T16:04:37Z","timestamp":1371485077000},"source":"Crossref","is-referenced-by-count":0,"title":["Network Intrusion Detection based on GMKL Algorithm"],"prefix":"10.4304","volume":"8","author":[{"given":"Li","family":"Yuxiang","sequence":"first","affiliation":[]},{"given":"Wang","family":"Haiming","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Hongkui","sequence":"additional","affiliation":[]},{"given":"Ren","family":"Changquan","sequence":"additional","affiliation":[]},{"given":"Geng","family":"Qingjia","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,6,15]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.3.636-644"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.5.823-830"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.9.1327-1333"},{"issue":"No. 6","key":"ref4","first-page":"102","article-title":"Lingyun. Network Intrusion Detection Method based on Multi-weighted Clustering.","volume":"31","year":"2011","unstructured":"[5] Lingyun. Network Intrusion Detection Method based on Multi-weighted Clustering. Suzhou University (Engineering Science Edition), Vol. 31, No. 6, pp. 102-103, 2011","journal-title":"Suzhou University"},{"issue":"No. 8","key":"ref5","first-page":"60","article-title":"SVM-based Network Intrusion Detection System.","volume":"8","author":"Shien","year":"2011","unstructured":"[6] Yang Shien, Chen Chunmei. SVM-based Network Intrusion Detection System. Yangtze University (Natural Science Edition), Vol. 8, No. 8, pp. 60-69, 2011","journal-title":"Yangtze University"},{"issue":"No. 3","key":"ref6","first-page":"150","article-title":"Network Intrusion Detection Method based on Improved Hidden Markov Model.","volume":"31","author":"Xiaofeng","year":"2010","unstructured":"[7] Yang Xiaofeng, Sun Mingming, Hu Xuelei. Network Intrusion Detection Method based on Improved Hidden Markov Model. Communications, Vol. 31, No. 3, pp. 150-152, 2010","journal-title":"Communications","ISSN":"https:\/\/id.crossref.org\/issn\/0341-2059","issn-type":"print"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref8","volume-title":"A feature selection new to n method for support vector machine classification (Technical Report02-03)","author":"Fung","year":"2002","unstructured":"[10] Fung, G., & Mangasarian, OL (2002). A feature selection new to n method for support vector machine classification (Technical Report02-03). Univ. Of Wisconsin."},{"issue":"No. 4","key":"ref9","first-page":"56","article-title":"Support Vector Machine-based Intrusion Detection Systems","volume":"14","author":"Xian","year":"2003","unstructured":"[12] Rao Xian, Dong Chunxi, Yang Shaoquan. Support Vector Machine-based Intrusion Detection Systems, Journal of Software, Vol. 14, No. 4, pp. 56-58, 2003","journal-title":"J Softw","ISSN":"https:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"issue":"No. 26","key":"ref10","first-page":"93","volume":"48","author":"Baohua","year":"2012","unstructured":"[13] Zhang Baohua. Applications of Decision Rule Classifiers in Network Intrusion Detection Computer Engineering and Application, Vol. 48, No. 26, pp.93-95, 2012","journal-title":"Applications of Decision Rule Classifiers in Network Intrusion Detection Computer Engineering and Application"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.6.429-433"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.6.420-428"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.6.415-419"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.6.408-414"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.6.394-400"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.6.387-393"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.7.4.303-308"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[4] Yang Yixian, Niu Xinxi. Intrusion Detection Theory and Technology. Beijing: Higher Education Press, No. 4, pp. 89-90, 2006","DOI":"10.4304\/jmm.7.4.303-308"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[9] Wang Hong qiao, Sun Fuchun, Cai Yanning. Multi-kernel Learning Methods. AAS, 2010, 36 (8).","DOI":"10.4304\/jmm.7.4.303-308"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[11] ManikVarma, BodlaRakeshBabu.More Generality in Efficient Multiple Kernel Learning.the 26thInternational Conference on Machine Learning, Canada, 2009.","DOI":"10.4304\/jmm.7.4.303-308"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[14] Bai Liang, Lao Songyang, Chen Jianzan. Audio Classification and Segmentation based on Support Vector Machine. Hormone Science .2005, 28 (3).","DOI":"10.4304\/jmm.7.4.303-308"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[15] Liu Jie. Support Vector Machine-based Network Intrusion Detection System, Central South University Thesis, 2008.","DOI":"10.4304\/jmm.7.4.303-308"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"[23] Yinbo, XiaJingbo, FuKai. The prediction research of the Network traffic based on the IPSO Chaos Support Vector Machine (SVM). Computer application research, Vol.29, No. 11, pp. 4293-4299, 2011","DOI":"10.4304\/jmm.7.4.303-308"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:02:05Z","timestamp":1738774925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,15]]},"references-count":23,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2013,6,15]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.6.1322-1328","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,6,15]]}}}