{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T05:51:21Z","timestamp":1719813081451},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["IJCIS"],"DOI":"10.1080\/18756891.2015.1084705","type":"journal-article","created":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T12:22:08Z","timestamp":1442838128000},"page":"841","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":19,"title":["Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System"],"prefix":"10.1007","volume":"8","author":[{"given":"Mohanad","family":"Albayati","sequence":"first","affiliation":[]},{"given":"Biju","family":"Issac","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.36"},{"key":"CIT0002","first-page":"1044","volume":"1","author":"Neethu B.","year":"2012","journal-title":"International Journal of Electronics and Computer Science Engineering,"},{"key":"CIT0003","first-page":"32","volume":"2","author":"Bace R.","year":"1999","journal-title":"ICSA White"},{"key":"CIT0004","unstructured":"Bayesnets.com, (2014).Bayes nets.[Online] Available at: http:\/\/www.bayesnets.com\/ [Accessed 25 May. 2014]."},{"key":"CIT0008","first-page":"6","author":"Reddy K.","year":"2011","journal-title":"World Congress on Engineering,"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0752529"},{"key":"CIT0011","author":"IDS A.","year":"2014","journal-title":"An Introduction to IDS | Symantec Connect Community"},{"key":"CIT0013","author":"Anderson James P.","year":"1980","journal-title":"Technical Report,"},{"key":"CIT0016","unstructured":"M, Oded, and R, Lior. (2010). Random Trees in the \u201cData Mining and Knowledge Discovery Handbook\u201d, Springer."},{"key":"CIT0017","first-page":"517","volume":"35","author":"Aydin M. A.","year":"2009","journal-title":"A hybrid intrusion detection system design for computer network security"},{"key":"CIT0019","first-page":"1","author":"Tavallaee M.","year":"2009","journal-title":"in IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_13"},{"key":"CIT0021","author":"NSL-KDD","year":"2014","journal-title":"The NSL-KDD Dataset."},{"key":"CIT0022","first-page":"1","volume":"30","year":"2012","journal-title":"Procedia Engineering,"},{"issue":"6","key":"CIT0023","first-page":"11","volume":"9","author":"Srinivasulu P.","year":"2009","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"CIT0024","first-page":"pp.73","author":"Pearl J.","year":"1988","journal-title":"Morgan Kaufmann"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"CIT0026","first-page":"127","author":"Benferhat S.","year":"2009","journal-title":"Integrating Anomaly-Based Approach into Bayesian Network Classifiers"},{"key":"CIT0028","first-page":"38","author":"Schultz M. G.","year":"2001","journal-title":"IEEE Symposium on Security and Privacy, Columbia University,"},{"key":"CIT0030","author":"Stat.berkeley.edu","year":"2014","journal-title":"Random forests - classification description"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1145\/1269880.1269882"},{"key":"CIT0035","author":"Lee W.","journal-title":"7th USENIXSecurity Symposium,"},{"key":"CIT0036","author":"WEKA","year":"2014","journal-title":"Weka 3 - Data Mining with Open Source Machine Learning Software in Java."}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/18756891.2015.1084705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,10]],"date-time":"2021-12-10T11:15:00Z","timestamp":1639134900000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.atlantis-press.com\/article\/25868634"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":23,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2015]]}},"alternative-id":["25868634"],"URL":"https:\/\/doi.org\/10.1080\/18756891.2015.1084705","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}