Show simple item record

dc.contributor.authorXue, Yu
dc.contributor.authorJia, Weiwei
dc.contributor.authorZhao, Xuejian
dc.contributor.authorPang, Wei
dc.date.accessioned2018-10-17T23:06:36Z
dc.date.available2018-10-17T23:06:36Z
dc.date.issued2018-10-09
dc.identifier.citationXue , Y , Jia , W , Zhao , X & Pang , W 2018 , ' An Evolutionary Computation Based Feature Selection Method for Intrusion Detection ' Security and Communication Networks , vol. 2018 , 2492956 . https://doi.org/10.1155/2018/2492956en
dc.identifier.issn1939-0114
dc.identifier.otherPURE: 139998804
dc.identifier.otherPURE UUID: 20d7df94-4385-45be-909f-558a0b46c622
dc.identifier.otherScopus: 85056575349
dc.identifier.otherORCID: /0000-0002-1761-6659/work/59923263
dc.identifier.urihttp://hdl.handle.net/2164/11287
dc.descriptionData Availability: The data used to support the fndings of this study are available from the corresponding author upon request. This work was supported by the National Natural Science Foundation of China (61403206, 61771258, and 61876089), the Natural Science Foundation of Jiangsu Province (BK20141005 and BK20160910), the Natural Science Foundation of the Jiangsu Higher Education Institutions of China (14KJB520025), the Priority Academic Program Development of Jiangsu Higher Education Institutions, the Open Research Fund of Jiangsu Engineering Research Center of Communication and Network Technology, NJUPT (JSGCZX17001), and the Natural Science Foundation of Jiangsu Province of China under Grant BK20140883.en
dc.language.isoeng
dc.relation.ispartofSecurity and Communication Networksen
dc.rightsCopyright © 2018 Yu Xue et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0/en
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subject.lccQA75en
dc.titleAn Evolutionary Computation Based Feature Selection Method for Intrusion Detectionen
dc.typeJournal articleen
dc.contributor.institutionUniversity of Aberdeen, Computing Scienceen
dc.contributor.institutionUniversity of Aberdeen, Institute for Complex Systems and Mathematical Biology (ICSMB)en
dc.description.statusPeer revieweden
dc.description.versionPublisher PDFen
dc.identifier.doihttps://doi.org/10.1155/2018/2492956


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record