{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:13:42Z","timestamp":1725844422167},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319264486"},{"type":"electronic","value":"9783319264509"}],"license":[{"start":{"date-parts":[[2015,12,20]],"date-time":"2015-12-20T00:00:00Z","timestamp":1450569600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-26450-9_6","type":"book-chapter","created":{"date-parts":[[2015,12,18]],"date-time":"2015-12-18T19:51:32Z","timestamp":1450468292000},"page":"139-167","source":"Crossref","is-referenced-by-count":2,"title":["An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique"],"prefix":"10.1007","author":[{"given":"P.","family":"de las Cuevas","sequence":"first","affiliation":[]},{"given":"Z.","family":"Chelly","sequence":"additional","affiliation":[]},{"given":"A. M.","family":"Mora","sequence":"additional","affiliation":[]},{"given":"J. J.","family":"Merelo","sequence":"additional","affiliation":[]},{"given":"A. I.","family":"Esparcia-Alc\u00e1zar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,20]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Alfaro-Cid, E., Sharman, K., Esparcia-Alc\u00e1zar, A.: A genetic programming approach for bankruptcy prediction using a highly unbalanced database. In: Giacobini, M. (ed.) Applications of Evolutionary Computing. Lecture Notes in Computer Science, vol. 4448, pp. 169\u2013178. Springer, Heidelberg (2007). \n http:\/\/dx.doi.org\/10.1007\/978-3-540-71805-5_19","DOI":"10.1007\/978-3-540-71805-5_19"},{"issue":"1","key":"6_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"6_CR3","unstructured":"Breivik, G.: Abstract misuse patterns\u2014a new approach to security requirements. Master thesis. Department of Information Science. University of Bergen, Bergen, N-5020 NORWAY (2002)"},{"key":"6_CR4","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"N. V. Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Int. Res. 16(1), 321\u2013357 (2002). \n http:\/\/dl.acm.org\/citation.cfm?id=1622407.1622416","journal-title":"Journal of Artificial Intelligence Research"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Chawla, N.: Data mining for imbalanced datasets: an overview. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 853\u2013867. Springer, USA (2005). \n http:\/\/dx.doi.org\/10.1007\/0-387-25465-X_40","DOI":"10.1007\/0-387-25465-X_40"},{"key":"6_CR6","unstructured":"Chelly, Z.: New danger classification methods in an imprecise framework. Ph.D. thesis. Laboratoire de Recherche Op\u00e9rationelle de D\u00e9cision et de Contr\u00f4le de Processus, Institut Sup\u00e9rieur de Gestion, Tunisia (2014)"},{"key":"6_CR7","volume-title":"Firewalls and Internet Security: Repelling the Wily Hacker","author":"WR Cheswick","year":"2003","unstructured":"Cheswick, W.R., Bellovin, S.M., Rubin, A.D.: Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Longman Publishing Co., Inc., Boston (2003)"},{"key":"6_CR8","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/B978-1-55860-377-6.50023-2","volume-title":"Machine Learning Proceedings 1995","author":"William W. Cohen","year":"1995","unstructured":"Cohen, W.W.: Fast effective rule induction. In: Proceedings of the Twelfth International Conference on Machine Learning, pp. 115\u2013123 (1995)"},{"key":"6_CR9","unstructured":"Danezis, G.: Inferring privacy policies for social networking services. In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence. AISec 2009, pp. 5\u201310. ACM, New York (2009). \n http:\/\/doi.acm.org\/10.1145\/1654988.1654991"},{"key":"6_CR10","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1613\/jair.816","volume":"15","author":"T Elomaa","year":"2001","unstructured":"Elomaa, T., Kaariainen, M.: An analysis of reduced error pruning. Artif. Intell. Res. 15, 163\u2013187 (2001)","journal-title":"Artif. Intell. Res."},{"key":"6_CR11","unstructured":"Frank, E., Witten, I.H.: Generating accurate rule sets without global optimization. In: Shavlik, J. (ed.) Fifteenth International Conference on Machine Learning, pp. 144\u2013151. Morgan Kaufmann, San Francisco (1998)"},{"key":"6_CR12","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"E Frank","year":"2011","unstructured":"Frank, E., Witten, I.H.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Morgan Kaufmann Publishers, San Francisco (2011)","edition":"3"},{"key":"6_CR13","unstructured":"Greenstadt, R., Beal, J.: Cognitive security for personal devices. In: Proceedings of the 1st ACM Workshop on Workshop on AISec. AISec 2008, pp. 27\u201330. ACM, New York (2008). \n http:\/\/doi.acm.org\/10.1145\/1456377.1456383"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Guo, X., Yin, Y., Dong, C., Yang, G., Zhou, G.: On the class imbalance problem. In: Fourth International Conference on Natural Computation. ICNC 2008, vol. 4, pp. 192\u2013201, October 2008","DOI":"10.1109\/ICNC.2008.871"},{"key":"6_CR15","unstructured":"Harris, E.: The Next Step in the Spam Control War: Greylisting (2003)"},{"issue":"5","key":"6_CR16","doi-asserted-by":"crossref","first-page":"429","DOI":"10.3233\/IDA-2002-6504","volume":"6","author":"Nathalie Japkowicz","year":"2002","unstructured":"Japkowicz, N., Stephen, S.: The class imbalance problem: a systematic study. Intell. Data Anal. 6(5), 429\u2013449, October 2002. \n http:\/\/dl.acm.org\/citation.cfm?id=1293951.1293954","journal-title":"Intelligent Data Analysis"},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2005.9","volume":"17","author":"R Jensen","year":"2005","unstructured":"Jensen, R., Shen, Q.: Semantics-preserving dimensionality reduction: Rough and fuzzy-rough-based approaches. IEEE Trans. Knowl. Data Eng. 17(1), 1 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TFUZZ.2006.889761","volume":"15","author":"R Jensen","year":"2007","unstructured":"Jensen, R., Shen, Q.: Fuzzy-rough sets assisted attribute selection. IEEE Trans. Fuzzy Syst. 15(1), 73\u201389 (2007)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"6_CR19","volume-title":"Designing Network Security","author":"M Kaeo","year":"2003","unstructured":"Kaeo, M.: Designing Network Security. Cisco Press, Indianapolis (2003)"},{"key":"6_CR20","unstructured":"Kelley, P.G., Hankes\u00a0Drielsma, P., Sadeh, N., Cranor, L.F.: User-controllable learning of security and privacy policies. In: Proceedings of the 1st ACM Workshop on Workshop on AISec. AISec 2008, pp. 11\u201318. ACM, New York (2008). \n http:\/\/doi.acm.org\/10.1145\/1456377.1456380"},{"key":"6_CR21","unstructured":"Lim, Y.T., Cheng, P.C., Clark, J., Rohatgi, P.: Policy evolution with genetic programming: a comparison of three approaches. In: IEEE Congress on Evolutionary Computation. CEC 2008. (IEEE World Congress on Computational Intelligence), pp. 1792\u20131800, June 2008"},{"key":"6_CR22","unstructured":"Lim, Y.T., Cheng, P.C., Rohatgi, P., Clark, J.A.: Mls security policy evolution with genetic programming. In: Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation. GECCO 2008, pp. 1571\u20131578. ACM, New York (2008). \n http:\/\/doi.acm.org\/10.1145\/1389095.1389395"},{"key":"6_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8","volume-title":"Feature Extraction, Construction and Selection: A Data Mining Perspective","author":"H Liu","year":"1998","unstructured":"Liu, H., Motoda, H.: Feature Extraction, Construction and Selection: A Data Mining Perspective. Springer, USA (1998)"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-73614-1_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"C Ludl","year":"2007","unstructured":"Ludl, C., McAllister, S., Kirda, E., Kruegel, C.: On the effectiveness of techniques to detect phishing sites. In: H\u00e4mmerli, B.M., Sommer, R. (eds.) Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 20\u201339. Springer, Heidelberg (2007)"},{"key":"6_CR25","unstructured":"MacQueen, J., et al.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the fifth Berkeley Symposium on Mathematical Statistics and Probability, pp. 281\u2013297, no. 14. California, USA (1967)"},{"key":"6_CR26","unstructured":"Martin, B.: Instance-based learning: nearest neighbor with generalization. Master\u2019s thesis, University of Waikato, Hamilton, New Zealand (1995)"},{"key":"6_CR27","unstructured":"McAfee: Mcafee labs threats report, June 2014 . \n http:\/\/www.mcafee.com\/uk\/about\/newsroom\/research-reports.aspx"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Mora, A., De las Cuevas, P., Merelo, J.: Going a step beyond the black and white lists for url accesses in the enterprise by means of categorical classifiers. In: Proceedings of the International Conference on Evolutionary Computation Theory and Applications (ECTA). SCITEPRESS, pp. 125\u2013134 (2014)","DOI":"10.5220\/0005170601250134"},{"key":"6_CR29","unstructured":"Mora, A., De las Cuevas, P., Merelo, J., Zamarripa, S., Juan, M., Esparcia-Alc\u00e1zar, A., Burvall, M., Arfwedson, H., Hodaie, Z.: MUSES: a corporate user-centric system which applies computational intelligence methods. In: Shin, D. et al., (ed.) 29th Symposium On Applied Computing, pp. 1719\u20131723 (2014)"},{"key":"6_CR30","unstructured":"Netcraft: November 2014 web server survey (2014). \n http:\/\/news.netcraft.com\/archives\/category\/web-server-survey\/"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Pawlak, Z., Polkowski, L., Skowron, A.: Rough set theory. In: Wah, B.W. (ed.) Wiley Encyclopedia of Computer Science and Engineering. Wiley, Hoboken (2008)","DOI":"10.1002\/9780470050118.ecse466"},{"issue":"3","key":"6_CR32","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0020-7373(87)80053-6","volume":"27","author":"JR Quinlan","year":"1987","unstructured":"Quinlan, J.R.: Simplifying decision trees. Man Mach. Stud. 27(3), 221\u2013234 (1987)","journal-title":"Man Mach. Stud."},{"key":"6_CR33","volume-title":"Programs for Machine Learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan, J.R.: Programs for Machine Learning. Morgan Kaufmann, San Mateo (1993)"},{"key":"6_CR34","unstructured":"Seigneur, J.M., K\u00f6lndorfer, P., Busch, M., Hochleitner, C.: A survey of trust and risk metrics for a BYOD mobile working world. In: Third International Conference on Social Eco-Informatics (2013)"},{"issue":"3","key":"6_CR35","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11633-007-0217-y","volume":"4","author":"Q Shen","year":"2007","unstructured":"Shen, Q., Jensen, R.: Rough sets, their extensions and applications. Int. J. Autom. Comput. 4(3), 217\u2013228 (2007)","journal-title":"Int. J. Autom. Comput."},{"issue":"2","key":"6_CR36","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2004.07.001","volume":"24","author":"JM Stanton","year":"2005","unstructured":"Stanton, J.M., Stam, K.R., Mastrangelo, P., Jolton, J.: Analysis of end user security behaviors. Comput. Secur. 24(2), 124\u2013133 (2005)","journal-title":"Comput. Secur."},{"key":"6_CR37","first-page":"127","volume-title":"Advances in Intelligent and Soft Computing","author":"G. Suarez-Tangil","year":"2009","unstructured":"Suarez-Tangil, G., Palomar, E., Fuentes, J., Blasco, J., Ribagorda, A.: Automatic rule generation based on genetic programming for event correlation. In: Herrero, A., Gastaldo, P., Zunino, R., Corchado, E. (eds.) Computational Intelligence in Security for Information Systems, Advances in Intelligent and Soft Computing, vol. 63, pp. 127\u2013134. Springer, Heidelberg (2009). \n http:\/\/dx.doi.org\/10.1007\/978-3-642-04091-7_16"},{"key":"6_CR38","unstructured":"Team, S.: Squid website (2013). \n http:\/\/www.squid-cache.org\/"},{"key":"6_CR39","unstructured":"Team, S.: Squid faq\u2014squid log files (2014)"},{"key":"6_CR40","unstructured":"Team, T.J.D.: Drools documentation. version 6.0.1.final (2013). \n http:\/\/docs.jboss.org\/drools\/release\/6.0.1.Final\/drools-docs\/html\/index.html"},{"key":"6_CR41","unstructured":"Team, T.J.D.: Drools website (2013). \n http:\/\/www.jboss.org\/drools.html"},{"key":"6_CR42","unstructured":"Waikato, U.: Weka (1993), University of Waikato, September 2014, \n http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/"},{"key":"6_CR43","volume-title":"Squid: The Definitive Guide","author":"D Wessels","year":"2004","unstructured":"Wessels, D.: Squid: The Definitive Guide, 1st edn. O\u2019Reilly Media Inc., Sebastopol (2004)","edition":"1"},{"key":"6_CR44","unstructured":"Wiki, S.: Squid hierarchy (2014)"},{"issue":"2","key":"6_CR45","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1111\/0824-7935.00140","volume":"17","author":"DC Wilson","year":"2001","unstructured":"Wilson, D.C., Leake, D.B.: Maintaining case-based reasoners: dimensions and directions. Comput. Intell. 17(2), 196\u2013213 (2001)","journal-title":"Comput. Intell."},{"issue":"3","key":"6_CR46","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1023\/A:1011219601502","volume":"16","author":"N Zhong","year":"2001","unstructured":"Zhong, N., Dong, J., Ohsuga, S.: Using rough sets with heuristics for feature selection. J. Intell. Inf. Syst. 16(3), 199\u2013214 (2001)","journal-title":"J. Intell. Inf. Syst."}],"container-title":["Studies in Computational Intelligence","Recent Advances in Computational Intelligence in Defense and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26450-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T21:18:53Z","timestamp":1559337533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26450-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,20]]},"ISBN":["9783319264486","9783319264509"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26450-9_6","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2015,12,20]]}}}