iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.3233/JIFS-169960
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:25:30Z","timestamp":1726061130479},"reference-count":29,"publisher":"IOS Press","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2019,5,14]]},"DOI":"10.3233\/jifs-169960","type":"journal-article","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T16:22:39Z","timestamp":1549383759000},"page":"3993-4003","source":"Crossref","is-referenced-by-count":12,"title":["An Improved Rough Set Theory based Feature Selection Approach for Intrusion Detection in SCADA Systems"],"prefix":"10.3233","volume":"36","author":[{"given":"S.","family":"Priyanga","sequence":"first","affiliation":[{"name":"Centre for Information Super Highway (CISH), School of Computing, SASTRA Deemed University, Thanjavur, Tamilnadu, India"}]},{"given":"M.R.","family":"Gauthama Raman","sequence":"additional","affiliation":[{"name":"iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design (SUTD), Singapore City, Singapore"}]},{"given":"Sujeet S.","family":"Jagtap","sequence":"additional","affiliation":[{"name":"Centre for Information Super Highway (CISH), School of Computing, SASTRA Deemed University, Thanjavur, Tamilnadu, India"}]},{"given":"N.","family":"Aswin","sequence":"additional","affiliation":[{"name":"Centre for Information Super Highway (CISH), School of Computing, SASTRA Deemed University, Thanjavur, Tamilnadu, India"}]},{"given":"Kannan","family":"Kirthivasan","sequence":"additional","affiliation":[{"name":"Discrete Mathematics Research Laboratory (DMRL), Department of Mathematics, SASTRA Deemed to be University, Thanjavur, Tamilnadu, India"}]},{"given":"V.S.","family":"Shankar Sriram","sequence":"additional","affiliation":[{"name":"Centre for Information Super Highway (CISH), School of Computing, SASTRA Deemed University, Thanjavur, Tamilnadu, India"}]}],"member":"7437","reference":[{"key":"10.3233\/JIFS-169960_ref1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.cose.2017.04.005","article-title":"Cyber physical systems security: Analysis, challenges and solutions","volume":"68","author":"Ashibani","year":"2017","journal-title":"Comput Secur"},{"key":"10.3233\/JIFS-169960_ref2","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1016\/j.cose.2017.06.010","article-title":"Assessing and augmenting SCADA cyber security: A survey of techniques","volume":"70","author":"Nazir","year":"2017","journal-title":"Comput Secur"},{"key":"10.3233\/JIFS-169960_ref3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.cose.2017.09.004","article-title":"A safety\/security risk analysis approach of Industrial Control Systems: A cyber bowtie \u2013 combining new version of attack tree with bowtie analysis","volume":"72","author":"Abdo","year":"2018","journal-title":"Comput Secur"},{"key":"10.3233\/JIFS-169960_ref5","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.comnet.2018.01.037","article-title":"Access control for cyber-physical systems interconnected to the cloud","volume":"134","author":"Lopez","year":"2018","journal-title":"Comput Networks"},{"key":"10.3233\/JIFS-169960_ref6","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.compeleceng.2018.05.006","article-title":"An efficient Intrusion Detection System against cyber-physical attacks in the smart grid \u2606","volume":"68","author":"Attia","year":"2018","journal-title":"Comput Electr Eng"},{"key":"10.3233\/JIFS-169960_ref7","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.jnca.2015.12.004","article-title":"A multi-level intrusion detection method for abnormal network behaviors","volume":"62","author":"Ji","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"10.3233\/JIFS-169960_ref8","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s10586-015-0527-8","article-title":"A feature selection approach to find optimal feature subsets for the network intrusion detection system","volume":"19","author":"Kang","year":"2016","journal-title":"Cluster Comput"},{"key":"10.3233\/JIFS-169960_ref9","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.cose.2017.06.005","article-title":"A GA-LR wrapper approach for feature selection in network intrusion detection","volume":"70","author":"Khammassi","year":"2017","journal-title":"Comput Secur"},{"key":"10.3233\/JIFS-169960_ref10","doi-asserted-by":"crossref","first-page":"612","DOI":"10.14429\/dsj.66.10802","article-title":"Rough set-hypergraph-based feature selection approach for intrusion detection systems","volume":"66","author":"Raman","year":"2016","journal-title":"Def Sci"},{"key":"10.3233\/JIFS-169960_ref11","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.compeleceng.2017.01.006","article-title":"Development of Rough Set \u2013 Hypergraph Technique for Key Feature Identification in Intrusion Detection Systems","volume":"59","author":"Gauthama Raman","year":"2017","journal-title":"Comput Electr Eng"},{"key":"10.3233\/JIFS-169960_ref12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2017.07.005","article-title":"An efficient intrusion detection system based on hypergraph - Genetic algorithm for parameter optimization and feature selection in support vector machine","volume":"134","author":"Gauthama Raman","year":"2017","journal-title":"Knowledge-Based Syst"},{"key":"10.3233\/JIFS-169960_ref13","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.asoc.2017.06.032","article-title":"RST-BatMiner: A fuzzy rule miner integrating rough set feature selection and Bat optimization for detection of diabetes disease","volume":"67","author":"Cheruku","year":"2018","journal-title":"Appl Soft Comput J"},{"issue":"1","key":"10.3233\/JIFS-169960_ref14","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.cmpb.2013.10.007","article-title":"Supervised hybrid feature selection based on PSO and rough sets for medical diagnosis","volume":"113","author":"Inbarani","year":"2014","journal-title":"Comput Methods Programs Biomed"},{"key":"10.3233\/JIFS-169960_ref15","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1007\/s00521-015-1840-0","article-title":"A novel hybrid feature selection method based on rough set and improved harmony search","volume":"6","author":"Inbarani","year":"2015","journal-title":"Neural Comput Appl"},{"key":"10.3233\/JIFS-169960_ref16","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.asoc.2016.03.014","article-title":"Hybrid Tolerance Rough Set\u2013Firefly based supervised feature selection for MRI brain tumor image classification","volume":"46","author":"and","year":"2016","journal-title":"Appl Soft Comput J"},{"issue":"10","key":"10.3233\/JIFS-169960_ref17","doi-asserted-by":"crossref","first-page":"4535","DOI":"10.1007\/s11227-017-2032-8","article-title":"A rough set-based hypergraph trust measure parameter selection technique for cloud service selection","volume":"73","author":"Somu","year":"2017","journal-title":"J Supercomput"},{"key":"10.3233\/JIFS-169960_ref18","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.cie.2017.10.025","article-title":"A cooperative swarm intelligence algorithm based on quantum-inspired and rough sets for feature selection","volume":"115","author":"Zouache","year":"2018","journal-title":"Comput Ind Eng"},{"key":"10.3233\/JIFS-169960_ref19","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.compag.2017.02.026","article-title":"An improved moth flame optimization algorithm based on rough sets for tomato diseases detection","volume":"136","author":"Hassanien","year":"2017","journal-title":"Comput Electron Agric"},{"key":"10.3233\/JIFS-169960_ref20","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1016\/j.asoc.2018.01.040","article-title":"A group incremental feature selection for classification using rough set theory based genetic algorithm","volume":"65","author":"Das","year":"2018","journal-title":"Appl Soft Comput J"},{"key":"10.3233\/JIFS-169960_ref21","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.ijar.2018.07.011","article-title":"Feature selection based on composition of rough sets induced by feature granulation","volume":"101","author":"Ferone","year":"2018","journal-title":"Int J Approx Reason"},{"issue":"5","key":"10.3233\/JIFS-169960_ref22","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","article-title":"Rough sets","volume":"11","author":"Pawlak","year":"1982","journal-title":"Int J Comput Inf Sci"},{"key":"10.3233\/JIFS-169960_ref23","doi-asserted-by":"crossref","unstructured":"Y.Y. Yao , A partition model of granular computing, Transactions on Rough Sets I. 2004.","DOI":"10.1007\/978-3-540-27794-1_11"},{"key":"10.3233\/JIFS-169960_ref24","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.neunet.2017.01.012","article-title":"A Hypergraph and Arithmetic Residue-based Probabilistic Neural Network for classification in Intrusion Detection Systems","volume":"92","author":"Raman","year":"2017","journal-title":"Neural Networks"},{"key":"10.3233\/JIFS-169960_ref25","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.future.2016.08.014","article-title":"A computational model for ranking cloud service providers using hypergraph based techniques","volume":"68","author":"Somu","year":"2017","journal-title":"Futur Gener Comput Syst"},{"key":"10.3233\/JIFS-169960_ref26","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.future.2018.04.033","article-title":"A trust centric optimal service ranking approach for cloud service selection","volume":"86","author":"Somu","year":"2018","journal-title":"Futur Gener Comput Syst"},{"key":"10.3233\/JIFS-169960_ref27","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.neunet.2018.08.005","article-title":"An improved robust heteroscedastic probabilistic neural network based trust prediction approach for cloud service selection","volume":"108","author":"Somu","year":"2018","journal-title":"Neural Networks"},{"key":"10.3233\/JIFS-169960_ref28","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.asoc.2017.11.006","article-title":"Whale optimization approaches for wrapper feature selection","volume":"62","author":"Mafarja","year":"2018","journal-title":"Appl Soft Comput J"},{"issue":"9","key":"10.3233\/JIFS-169960_ref29","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.1016\/j.comnet.2013.04.005","article-title":"Toward an efficient and scalable feature selection approach for internet traffic classification","volume":"57","author":"Fahad","year":"2013","journal-title":"Comput Networks"},{"issue":"3","key":"10.3233\/JIFS-169960_ref30","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/TII.2015.2420951","article-title":"Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data","volume":"11","author":"Pan","year":"2015","journal-title":"IEEE Trans Ind Informatics"}],"container-title":["Journal of Intelligent & Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-169960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,3]],"date-time":"2019-12-03T05:02:38Z","timestamp":1575349358000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospress&doi=10.3233\/JIFS-169960"}},"subtitle":[],"editor":[{"given":"V.","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"given":"V.","family":"Subramaniyaswamy","sequence":"additional","affiliation":[]},{"given":"Jemal","family":"Abawajy","sequence":"additional","affiliation":[]},{"given":"Longzhi","family":"Yang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,5,14]]},"references-count":29,"journal-issue":{"issue":"5"},"URL":"http:\/\/dx.doi.org\/10.3233\/jifs-169960","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,14]]}}}