{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:53:59Z","timestamp":1730202839596,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,15]]},"DOI":"10.1109\/ccci52664.2021.9583206","type":"proceedings-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T20:06:55Z","timestamp":1635365215000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection"],"prefix":"10.1109","author":[{"given":"Dongliang","family":"Xuan","sequence":"first","affiliation":[]},{"given":"Huaping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Bidong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"journal-title":"Correlation-based feature selection for machine learning","year":"1999","author":"hall","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4236\/jilsa.2014.61005"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","article-title":"A review on evaluation metrics for data classification evaluations","volume":"5","author":"hossin","year":"2015","journal-title":"International Journal of Data Mining & Knowledge Management Process"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102177"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"13","DOI":"10.5120\/ijca2017913992","article-title":"A network intrusion detection framework based on bayesian network using wrapper approach","volume":"166","author":"kabir","year":"2017","journal-title":"International Journal of Computer Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2018.8323682"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/app9204396"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4943509"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0172"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0111-1_25"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.923876"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.01.002"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.03.024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2519914"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903723"},{"key":"ref5","article-title":"Computer security threat monitoring and surveillance","author":"anderson","year":"1980","journal-title":"Technical Report"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44257-0_8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3335484.3335486"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"article-title":"Correlation-based feature selection of discrete and numeric class machine learning","year":"2000","author":"hall","key":"ref9"},{"journal-title":"NSL-KDD Dataset","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11771-019-4233-1"},{"key":"ref22","first-page":"258","article-title":"Network intrusion detection using naive bayes","volume":"7","author":"panda","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.042"},{"key":"ref24","first-page":"1848","article-title":"A detailed analysis on nsl-kdd dataset using various machine learning techniques for intrusion detection","volume":"2","author":"revathi","year":"2013","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7150-9_45"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4184196"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"}],"event":{"name":"2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","start":{"date-parts":[[2021,10,15]]},"location":"Beijing, China","end":{"date-parts":[[2021,10,17]]}},"container-title":["2021 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9583171\/9583183\/09583206.pdf?arnumber=9583206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:50Z","timestamp":1652201750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9583206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,15]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ccci52664.2021.9583206","relation":{},"subject":[],"published":{"date-parts":[[2021,10,15]]}}}