{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:18Z","timestamp":1738777218858,"version":"3.37.0"},"reference-count":15,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.6.1380-1387","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T02:59:48Z","timestamp":1402369188000},"source":"Crossref","is-referenced-by-count":1,"title":["The Discretization Algorithm for Rough Data and Its Application to Intrusion Detection"],"prefix":"10.4304","volume":"9","author":[{"given":"Zhicai","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yongxiang","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Dai","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,6,9]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/019697298125470"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.2.337-344"},{"issue":"no. 1","key":"ref3","first-page":"47","article-title":"Discretization techniques: a recent survey","volume":"32","author":"Kotsiantis","year":"2006","unstructured":"[3] Sotiris Kotsiantis, Dimitris Kanellopoulos, \"Discretization techniques: a recent survey,\" International Transactions on Computer Science and Engineering, vol. 32, no. 1, pp. 47-58, Jan. 2006.","journal-title":"International Transactions on Computer Science and Engineering"},{"issue":"no. 4","key":"ref4","first-page":"494","article-title":"Measurements of discretization schemes","volume":"21","author":"Wang","year":"2008","unstructured":"[6] Lihong Wang, Gengfeng Wu, \"Measurements of discretization schemes,\" Chinese Journal of Pattern Recognition and Artificial Intelligence, vol. 21, no. 4, pp. 494-499, Aug. 2008.","journal-title":"Chinese Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"no. 9","key":"ref5","first-page":"1570","article-title":"Discretization of continuous attributes in rough set theory based on information entropy","volume":"28","author":"Xie","year":"2005","unstructured":"[7] Hong Xie, Haozhong Cheng, Dongxiao Niu, \"Discretization of continuous attributes in rough set theory based on information entropy,\" Chinese Journal of Computers, vol. 28, no. 9, pp. 1570-1574, Sept. 2005.","journal-title":"Chinese Journal of Computers"},{"key":"ref6","first-page":"1022","article-title":"Multi-interval discretization of continuous-valued attributes for classification learning","volume-title":"Proceedings of the 13th International Joint Conference on Artificial Intelligence","author":"Fayyad","year":"1993","unstructured":"[8] U. M. Fayyad, K. B. Irani, \"Multi-interval discretization of continuous-valued attributes for classification learning,\" in Proceedings of the 13th International Joint Conference on Artificial Intelligence. San Mateo: Morgan Kaufmann Publisher, pp. 1022-1027, 1993."},{"key":"ref7","first-page":"123","article-title":"Discretization of numeric attributes","volume-title":"Proceedings of the 10th National Conference on Artificial Intelligence","author":"Kerber","year":"1992","unstructured":"[9] R. C. Kerber, \"Discretization of numeric attributes,\" in Proceedings of the 10th National Conference on Artificial Intelligence. Cambridge, USA: MIT Press, pp. 123-128, 1992."},{"issue":"no. 3","key":"ref8","first-page":"213","article-title":"A new method for continuous value attribute discretization in rough set theory","volume":"35","author":"He","year":"2003","unstructured":"[10] Yaqun He, Shousong Hu, \"A new method for continuous value attribute discretization in rough set theory,\" Chinese Journal of Nanjing University of Aeronautics & Astronautics, vol. 35, no. 3, pp. 213- 215, March 2003.","journal-title":"Chinese Journal of Nanjing University of Aeronautics & Astronautics"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.6.6.486-493"},{"issue":"no. 7","key":"ref10","first-page":"1165","article-title":"Adaptive intrusion detection algorithm based on rough set","volume":"48","author":"Zhao","year":"2008","unstructured":"[12] Xibin Zhao, Ranzhe Jing, \"Adaptive intrusion detection algorithm based on rough set,\" Chinese Journal of Qinghua University, vol. 48, no. 7, pp. 1165-1168, July 2008.","journal-title":"Chinese Journal of Qinghua University"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.2.330-340"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.5.863-868"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.9.1376-1383"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.4.4.248-253"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/72.991432"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:21Z","timestamp":1738775181000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,9]]},"references-count":15,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,9]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.6.1380-1387","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,6,9]]}}}