{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:24:45Z","timestamp":1732037085952},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Fuzzy Syst."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/tfuzz.2017.2755000","type":"journal-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T22:24:21Z","timestamp":1512426261000},"page":"1878-1892","source":"Crossref","is-referenced-by-count":83,"title":["Dynamic Fuzzy Rule Interpolation and Its Application to Intrusion Detection"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0659-9646","authenticated-orcid":false,"given":"Nitin","family":"Naik","sequence":"first","affiliation":[]},{"given":"Ren","family":"Diao","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9333-4605","authenticated-orcid":false,"given":"Qiang","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2612265"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.02.036"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.12.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-34783-6_49"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2000.838708"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73325-6_24"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s005000100152"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2012.2226942"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.09.035"},{"key":"ref35","first-page":"495","article-title":"Fuzzy rule interpolation by the least squares method","author":"johanyak","year":"2006","journal-title":"Proc Int Symp Hung Researchers Comput Intell"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.07.027"},{"key":"ref60","year":"2014"},{"key":"ref62","year":"2016"},{"key":"ref61","year":"2016"},{"key":"ref63","author":"bone","year":"2011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2004.836085"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(75)80002-2"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/S0888-613X(96)00054-0","article-title":"An improvement to Koczy\n and Hirota's interpolative reasoning in sparse fuzzy rule bases","volume":"15","author":"yan","year":"1996","journal-title":"Int J Approx Reason"},{"key":"ref65","author":"richard","year":"2001"},{"key":"ref66","first-page":"21","article-title":"Optimization of fuzzy rule sets using a bacterial evolutionary algorithm","volume":"15","author":"drobics","year":"2008","journal-title":"MathWare Soft Comput"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2000.838707"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI.2014.7028681"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/72.846747"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2043357"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(93)90010-B"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/03081079908935231"},{"key":"ref20","first-page":"144","article-title":"Approximate fuzzy reasoning based on interpolation in the vague environment of the fuzzy\n rulebase as a practical alternative of the classical CRI","author":"kovacs","year":"1997","journal-title":"Proc 7th Int Fuzzy Syst Assoc World Congr"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/91.855917"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1999.793270"},{"key":"ref24","first-page":"13","article-title":"Conservation of fuzziness in rule interpolation","author":"gedeon","year":"1996","journal-title":"Proc Symp New Trends Contr Large Scale Syst"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/91.890335"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(96)00190-X"},{"key":"ref25","first-page":"29","article-title":"An improved\n multidimensional $\\alpha$-cut based fuzzy\n interpolation technique","author":"wong","year":"2000","journal-title":"Int Conf on Artificial Intell Sci Tech"},{"key":"ref50","author":"claypool","year":"2002"},{"key":"ref51","author":"horn","year":"2014"},{"key":"ref59","author":"brandenburg","year":"2010"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/sec.186"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.fss.2013.04.001"},{"key":"ref56","first-page":"365","article-title":"Economic power dispatch using evolutionary algorithm","volume":"2","author":"kumar","year":"2006","journal-title":"Int J Mach Learn Comput"},{"key":"ref55","author":"goldberg","year":"1989","journal-title":"Genetic Algorithms in Search Optimization and Machine Learning"},{"key":"ref54","first-page":"211","article-title":"Economic power dispatch using evolutionary algorithm","volume":"57","author":"younes","year":"2006","journal-title":"J Electr Eng"},{"key":"ref53","author":"roesch","year":"2014"},{"key":"ref52","author":"rouse","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(02)00331-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2013.6622404"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2011.6007594"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2014.6891816"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2015.7338026"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/01969727308546046"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.306"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2016.7737671"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2005.859324"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2007.902038"},{"key":"ref19","first-page":"1","article-title":"Extension\n of the fuzzy rule interpolation method","author":"vass","year":"1992","journal-title":"Proc 6th Int Conf Fuzzy Sets Theory Appl"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/scj.4690261008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(93)90070-3"},{"key":"ref6","first-page":"303","article-title":"Comparative study of some adaptive fuzzy algorithms for manipulator control","volume":"3","author":"mohan","year":"2006","journal-title":"Int J Comput Intell"},{"key":"ref5","author":"astrom","year":"1995","journal-title":"Adaptive Control"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/91.940970"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(98)00394-7"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","article-title":"Network\n intrusion detection","volume":"8","author":"biswanath","year":"1994","journal-title":"IEEE Netw"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(02)00367-5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.13176\/11.125"},{"key":"ref45","author":"holland","year":"1975","journal-title":"Adaptation in Natural and Artificial Systems"},{"key":"ref48","author":"barnes","year":"2009"},{"key":"ref47","first-page":"113","article-title":"An\n efficient ga-based clustering technique","volume":"8","author":"lin","year":"2005","journal-title":"Tamkang J Sci Eng"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2582526"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2161584"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2303474"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.034"}],"container-title":["IEEE Transactions on Fuzzy Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/91\/8424402\/08125710.pdf?arnumber=8125710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T03:00:32Z","timestamp":1633921232000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8125710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":70,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tfuzz.2017.2755000","relation":{},"ISSN":["1063-6706","1941-0034"],"issn-type":[{"value":"1063-6706","type":"print"},{"value":"1941-0034","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}