{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:34:02Z","timestamp":1725550442767},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540287575"},{"type":"electronic","value":"9783540287582"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11551188_6","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:21:03Z","timestamp":1127830863000},"page":"54-62","source":"Crossref","is-referenced-by-count":26,"title":["GP Ensemble for Distributed Intrusion Detection Systems"],"prefix":"10.1007","author":[{"given":"Gianluigi","family":"Folino","sequence":"first","affiliation":[]},{"given":"Clara","family":"Pizzuti","sequence":"additional","affiliation":[]},{"given":"Giandomenico","family":"Spezzano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"The third international knowledge discovery and data mining tools competition dataset. In: kdd 1999 cup (1999), \n \n http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"issue":"5","key":"6_CR2","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TEVC.2002.800880","volume":"6","author":"E. Alba","year":"2002","unstructured":"Alba, E., Tomassini, M.: Parallelism and evolutionary algorithms. IEEE Transaction on Evolutionary Computation\u00a06(5), 443\u2013462 (2002)","journal-title":"IEEE Transaction on Evolutionary Computation"},{"issue":"7","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"A.P. Bradley","year":"1997","unstructured":"Bradley, A.P.: The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognition\u00a030(7), 1145\u20131159 (1997)","journal-title":"Pattern Recognition"},{"issue":"2","key":"6_CR4","first-page":"123","volume":"24","author":"L. Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Machine Learning\u00a024(2), 123\u2013140 (1996)","journal-title":"Machine Learning"},{"key":"6_CR5","first-page":"1015","volume-title":"Proc. of the Genetic and Evolutionary Computation Conference GECCO 1999","author":"G. Folino","year":"1999","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: A cellular genetic programming approach to classification. In: Proc. of the Genetic and Evolutionary Computation Conference GECCO 1999, Orlando, Florida, July 1999, pp. 1015\u20131020. Morgan Kaufmann, San Francisco (1999)"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/TEVC.2002.806168","volume":"7","author":"G. Folino","year":"2003","unstructured":"Folino, G., Pizzuti, C., Spezzano, G.: A scalable cellular implementation of parallel genetic programming. IEEE Transaction on Evolutionary Computation\u00a07(1), 37\u201353 (2003)","journal-title":"IEEE Transaction on Evolutionary Computation"},{"key":"6_CR7","unstructured":"Freund, Y., Schapire, R.: Experiments with a new boosting algorithm. In: Proceedings of the 13th Int. Conference on Machine Learning, pp. 148\u2013156 (1996)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1109\/CEC.2003.1299940","volume-title":"Proc. of the Congress on Evolutionary Computation CEC 2003","author":"W. Lu","year":"2003","unstructured":"Lu, W., Traore, I.: Detecting new forms of network intrusion using genetic programming. In: Proc. of the Congress on Evolutionary Computation CEC 2003, pp. 2165\u20132173. IEEE Press, Los Alamitos (2003)"},{"key":"6_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/978-3-540-24677-0_65","volume-title":"Innovations in Applied Artificial Intelligence","author":"S. Mukkamala","year":"2004","unstructured":"Mukkamala, S., Sung, A.H., Abraham, A.: Modeling intrusion detection systems using linear genetic programming approach. In: Orchard, B., Yang, C., Ali, M. (eds.) IEA\/AIE 2004. LNCS (LNAI), vol.\u00a03029, pp. 633\u2013642. Springer, Heidelberg (2004)"},{"key":"6_CR10","first-page":"725","volume-title":"Proceedings of the 13th National Conference on Artificial Intelligence AAAI 1996","author":"J.R. Quinlan","year":"1996","unstructured":"Quinlan, J.R.: Bagging, boosting, and c4.5. In: Proceedings of the 13th National Conference on Artificial Intelligence AAAI 1996, pp. 725\u2013730. MIT Press, Cambridge (1996)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1007\/3-540-45110-2_125","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"D. Song","year":"2003","unstructured":"Song, D., Heywood, M.I., Zincir-Heywood, A.N.: A linear genetic programming approach to intrusion detection. In: Cant\u00fa-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O\u2019Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol.\u00a02724, pp. 2325\u20132336. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11551188_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:00:21Z","timestamp":1619506821000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11551188_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287575","9783540287582"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11551188_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}