{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,28]],"date-time":"2024-04-28T11:40:32Z","timestamp":1714304432769},"reference-count":23,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004586","name":"Carlos Chagas Filho Foundation for Research Support of Rio de Janeiro State","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"State of Sao Paulo Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017580","name":"Teaching and Research National Network","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017580","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"National Council for Scientific and Technological Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordination of Higher Education Personnel Improvement","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1016\/j.adhoc.2024.103485","type":"journal-article","created":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T15:53:07Z","timestamp":1712245987000},"page":"103485","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation"],"prefix":"10.1016","volume":"159","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0290-7760","authenticated-orcid":false,"given":"Guilherme Nunes Nasseh","family":"Barbosa","sequence":"first","affiliation":[]},{"given":"Martin","family":"Andreoni","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1279-7366","authenticated-orcid":false,"given":"Diogo Menezes Ferrazani","family":"Mattos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2024.103485_b1","series-title":"Check point research: Third quarter of 2022 reveals increase in cyberattacks and unexpected developments in global trends","author":"Check Point Research Team","year":"2022"},{"issue":"1","key":"10.1016\/j.adhoc.2024.103485_b2","doi-asserted-by":"crossref","DOI":"10.3390\/info15010020","article-title":"Storage standards and solutions, data storage, sharing, and structuring in digital health: A Brazilian case study","volume":"15","author":"Oliveira","year":"2024","journal-title":"Information"},{"key":"10.1016\/j.adhoc.2024.103485_b3","series-title":"2019 7th International Conference on Cyber and IT Service Management, Vol. 7","first-page":"1","article-title":"Malware detection using honeypot and machine learning","author":"Matin","year":"2019"},{"key":"10.1016\/j.adhoc.2024.103485_b4","article-title":"An\u00e1lise de dados em redes sem fio de grande porte: Processamento em fluxo em tempo real, tend\u00eancias e desafios","author":"Medeiros","year":"2019","journal-title":"Soc. Brasileira Comput."},{"key":"10.1016\/j.adhoc.2024.103485_b5","series-title":"Aprendizado de m\u00e1quina em plataformas de processamento distribu\u00eddo de fluxo: An\u00e1lise e detec\u00e7\u00e3o de amea\u00e7as em tempo real","author":"Andreoni Lopez","year":"2018"},{"key":"10.1016\/j.adhoc.2024.103485_b6","series-title":"Anais Do XLI Simp\u00f3Sio Brasileiro de Redes de Computadores E Sistemas Distribu\u00edDos","first-page":"169","article-title":"Sele\u00e7\u00e3o de caracter\u00edsticas com alta quantidade de informa\u00e7\u00e3o para sistemas de detec\u00e7\u00e3o de intrus\u00e3o baseada no conjunto de domin\u00e2ncia de Pareto","author":"Barbosa","year":"2023"},{"key":"10.1016\/j.adhoc.2024.103485_b7","series-title":"2017 1st Cyber Security in Networking Conference","first-page":"1","article-title":"Collecting and characterizing a real broadband access network traffic dataset","author":"Andreoni Lopez","year":"2017"},{"key":"10.1016\/j.adhoc.2024.103485_b8","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"ICISSp"},{"key":"10.1016\/j.adhoc.2024.103485_b9","series-title":"2015 Military Communications and Information Systems Conference","first-page":"1","article-title":"UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)","author":"Moustafa","year":"2015"},{"key":"10.1016\/j.adhoc.2024.103485_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2021.104216","article-title":"Supervised feature selection techniques in network intrusion detection: A critical review","volume":"101","author":"Di Mauro","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.adhoc.2024.103485_b11","series-title":"2021 14th International Conference on Security of Information and Networks, Vol. 1","first-page":"1","article-title":"Automated microsegmentation for lateral movement prevention in industrial internet of things (iIoT)","author":"Arifeen","year":"2021"},{"issue":"1","key":"10.1016\/j.adhoc.2024.103485_b12","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1007\/s12652-020-02167-9","article-title":"Attack classification using feature selection techniques: a comparative study","volume":"12","author":"Thakkar","year":"2021","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.adhoc.2024.103485_b13","doi-asserted-by":"crossref","first-page":"38597","DOI":"10.1109\/ACCESS.2019.2905633","article-title":"A deep learning method with filter based feature engineering for wireless intrusion detection system","volume":"7","author":"Kasongo","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2024.103485_b14","first-page":"1","article-title":"A statistical analysis of intrinsic bias of network security datasets for training machine learning mechanisms","author":"Silva","year":"2022","journal-title":"Ann. Telecommun."},{"issue":"3","key":"10.1016\/j.adhoc.2024.103485_b15","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s12243-018-0663-2","article-title":"A fast unsupervised preprocessing method for network monitoring","volume":"74","author":"Andreoni Lopez","year":"2019","journal-title":"Ann. Telecommun."},{"key":"10.1016\/j.adhoc.2024.103485_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102215","article-title":"A novel model for anomaly detection in network traffic based on kernel support vector machine","volume":"104","author":"Ma","year":"2021","journal-title":"Comput. Secur."},{"key":"10.1016\/j.adhoc.2024.103485_b17","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.eswa.2018.04.004","article-title":"Web traffic anomaly detection using C-LSTM neural networks","volume":"106","author":"Kim","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.adhoc.2024.103485_b18","doi-asserted-by":"crossref","DOI":"10.1109\/TVT.2022.3193074","article-title":"Distributed online anomaly detection for virtualized network slicing environment","author":"Wang","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2024.103485_b19","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.113318","article-title":"Detection of illicit accounts over the ethereum blockchain","volume":"150","author":"Farrugia","year":"2020","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.adhoc.2024.103485_b20","series-title":"2016 IEEE International Conference on Communications","first-page":"1","article-title":"A resilient distributed controller for software defined networking","author":"Mattos","year":"2016"},{"issue":"3","key":"10.1016\/j.adhoc.2024.103485_b21","doi-asserted-by":"crossref","first-page":"1845","DOI":"10.1007\/s00366-021-01369-9","article-title":"A multi-objective optimization algorithm for feature selection problems","volume":"38","author":"Abdollahzadeh","year":"2022","journal-title":"Eng. Comput."},{"issue":"3","key":"10.1016\/j.adhoc.2024.103485_b22","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.dss.2012.04.001","article-title":"A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem","volume":"53","author":"Viduto","year":"2012","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.adhoc.2024.103485_b23","series-title":"2021 IEEE International Symposium on High-Performance Computer Architecture","first-page":"802","article-title":"Understanding training efficiency of deep learning recommendation models at scale","author":"Acun","year":"2021"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870524000969?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870524000969?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,28]],"date-time":"2024-04-28T11:14:11Z","timestamp":1714302851000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870524000969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":23,"alternative-id":["S1570870524000969"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103485","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103485","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103485"}}