{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T06:57:07Z","timestamp":1694933827222},"reference-count":19,"publisher":"International Academy Publishing (IAP)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.7.7.1641-1648","type":"journal-article","created":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T11:13:35Z","timestamp":1344856415000},"source":"Crossref","is-referenced-by-count":3,"title":["Efficient Intrusion Detection Based on Multiple Neural Network Classifiers with Improved Genetic Algorithm"],"prefix":"10.17706","volume":"7","author":[{"given":"Yuesheng","family":"Gu","sequence":"first","affiliation":[]},{"given":"Yongchang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,7,1]]},"reference":[{"key":"ref1","first-page":"1165","article-title":"Adaptive intrusion detection algorithm based on rough sets, J T singhua Univ (Sci & Tech)","volume":"48","author":"Zhao","year":"2008","journal-title":"Vo l."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11804-011-1036-7"},{"key":"ref3","first-page":"110","article-title":"Support vector machines based on genetic algorithm for network intrusion prediction","volume":"27","author":"Zhiqiang","year":"2010","journal-title":"Journal of Computer Simulation"},{"key":"ref4","first-page":"1","article-title":"GA-SVM-Based feature subset selection algorithm","volume":"20","author":"Qiao","year":"2006","journal-title":"Journal of Electronic Measurement and Instrument"},{"key":"ref5","first-page":"24","article-title":"Hybrid feature transformation based on modified particle swarm optimization and support vector machine","volume":"32","author":"Xiong","year":"2009","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"key":"ref6","first-page":"46","article-title":"Application of independent component analysis and manifold learning in fault diagnosis for VSC-HVDC systems.","volume":"45","author":"Li","year":"2011","journal-title":"Hsi-An Chiao Tung Ta Hsueh"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4156\/ijact.vol3.issue7.33"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.804323"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2011.02.017"},{"key":"ref10","first-page":"123","article-title":"A fast genetie algorithm based on energy-entropy","volume":"25","author":"Yi","year":"2005","journal-title":"Systems Engineering Theory and Practice"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.26-28.676"},{"key":"ref12","volume-title":"Artificial Intelligence: A Modern Approach.","author":"Russell","year":"2003","edition":"2nd Edn."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-97966-8"},{"key":"ref14","first-page":"264","article-title":"Learning fingerprints for a database intrusion detection system.","volume-title":"Proc. 7th Eur. Symp. Research in Computer Security","author":"Sin","year":"2002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/3468.935046"},{"key":"ref16","first-page":"639","volume-title":"A novel symmetric cryptography based on chaotic signal generator and a clipped neural network.","volume":"3174","author":"Zhou","year":"2004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2002.805796"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(90)90049-Q"},{"issue":"No. 9","key":"ref19","first-page":"1195","article-title":"Application of a radial basis function neural network for diagnosis of diabetes mellitus","volume":"91","author":"Venkatesan","year":"2006","journal-title":"Curr. Sci.","ISSN":"http:\/\/id.crossref.org\/issn\/0011-3891","issn-type":"print"}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T11:23:12Z","timestamp":1442316192000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/7873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":19,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2012,7,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.7.7.1641-1648","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,7,1]]}}}