{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:25:04Z","timestamp":1759335904865,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11277-022-09701-2","type":"journal-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T18:07:56Z","timestamp":1651255676000},"page":"3117-3132","update-policy":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Poly Logarithmic Naive Bayes Intrusion Detection System Using Linear Stable PCA Feature Extraction"],"prefix":"10.1007","volume":"125","author":[{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0000-0003-3966-3883","authenticated-orcid":false,"given":"Sukhvinder","family":"Singh","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"9701_CR1","doi-asserted-by":"publisher","first-page":"13624","DOI":"10.1109\/ACCESS.2018.2810198","volume":"6","author":"P Tao","year":"2018","unstructured":"Tao, P., Sun, Z., & Sun, Z. (2018). An improved intrusion detection algorithm based on GA and SVM. Ieee Access, 6, 13624\u201313631.","journal-title":"Ieee Access"},{"key":"9701_CR2","doi-asserted-by":"publisher","first-page":"4396","DOI":"10.3390\/app9204396","volume":"9","author":"H Liu","year":"2019","unstructured":"Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences, 9, 4396.","journal-title":"Applied Sciences"},{"key":"9701_CR3","doi-asserted-by":"crossref","unstructured":"Alrowaily, M., Alenezi, F., & Lu, Z. (2019). Effectiveness of machine learning based intrusion detection systems. In\u00a0International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage\u00a0(pp. 277\u2013288). Springer, Cham.","DOI":"10.1007\/978-3-030-24907-6_21"},{"key":"9701_CR4","first-page":"e1306","volume":"9","author":"A Handa","year":"2019","unstructured":"Handa, A., Sharma, A., & Shukla, S. K. (2019). Machine learning in cybersecurity: A review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9, e1306.","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"9701_CR5","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","volume":"21","author":"P Mishra","year":"2018","unstructured":"Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2018). A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials, 21, 686\u2013728.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"9701_CR6","doi-asserted-by":"publisher","first-page":"33789","DOI":"10.1109\/ACCESS.2018.2841987","volume":"6","author":"I Ahmad","year":"2018","unstructured":"Ahmad, I., Basheri, M., Iqbal, M. J., & Rahim, A. (2018). Performance comparison of support vector machine, random forest, and extreme learning machine for intrusion detection. IEEE Access, 6, 33789\u201333795.","journal-title":"IEEE Access"},{"key":"9701_CR7","doi-asserted-by":"crossref","unstructured":"Alhakami, W., ALharbi, A., Bourouis, S., Alroobaea, R., & Bouguila, N. (2019). Network anomaly intrusion detection using a nonparametric Bayesian approach and feature selection.\u00a0IEEE Access,\u00a07, 52181\u201352190.","DOI":"10.1109\/ACCESS.2019.2912115"},{"key":"9701_CR8","doi-asserted-by":"publisher","first-page":"40008","DOI":"10.1109\/ACCESS.2018.2855078","volume":"6","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., Kyriakopoulos, K. G., Aparicio-Navarro, F. J., Lambotharan, S., Assadhan, B., & Binsalleeh, H. (2018). A basic probability assignment methodology for unsupervised wireless intrusion detection. IEEE Access, 6, 40008\u201340023.","journal-title":"IEEE Access"},{"key":"9701_CR9","doi-asserted-by":"publisher","first-page":"71413","DOI":"10.1109\/ACCESS.2018.2881561","volume":"6","author":"S Lv","year":"2018","unstructured":"Lv, S., Wang, J., Yang, Y., & Liu, J. (2018). Intrusion prediction with system-call sequence-to-sequence model. IEEE Access, 6, 71413\u201371421.","journal-title":"IEEE Access"},{"key":"9701_CR10","doi-asserted-by":"publisher","first-page":"42450","DOI":"10.1109\/ACCESS.2019.2907965","volume":"7","author":"SU Jan","year":"2019","unstructured":"Jan, S. U., Ahmed, S., Shakhov, V., & Koo, I. (2019). Toward a lightweight intrusion detection system for the internet of things. IEEE Access, 7, 42450\u201342471.","journal-title":"IEEE Access"},{"key":"9701_CR11","doi-asserted-by":"publisher","first-page":"113081","DOI":"10.1109\/ACCESS.2019.2935154","volume":"7","author":"J Camacho","year":"2019","unstructured":"Camacho, J., Ther\u00f3n, R., Garc\u00eda-Gim\u00e9nez, J. M., Maci\u00e1-Fern\u00e1ndez, G., & Garc\u00eda-Teodoro, P. (2019). Group-wise principal component analysis for exploratory intrusion detection. IEEE Access, 7, 113081\u2013113093.","journal-title":"IEEE Access"},{"key":"9701_CR12","doi-asserted-by":"publisher","first-page":"94497","DOI":"10.1109\/ACCESS.2019.2928048","volume":"7","author":"BA Tama","year":"2019","unstructured":"Tama, B. A., Comuzzi, M., & Rhee, K.-H. (2019). TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system. IEEE Access, 7, 94497\u201394507.","journal-title":"IEEE Access"},{"key":"9701_CR13","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/JCN.2018.000041","volume":"20","author":"S Prabavathy","year":"2018","unstructured":"Prabavathy, S., Sundarakantham, K., & Shalinie, S. M. (2018). Design of cognitive fog computing for intrusion detection in Internet of Things. Journal of Communications and Networks, 20, 291\u2013298.","journal-title":"Journal of Communications and Networks"},{"key":"9701_CR14","doi-asserted-by":"crossref","unstructured":"Narasimha Mallikarjunan, K., Bhuvaneshwaran, A., Sundarakantham, K., & Mercy Shalinie, S. (2019). DDAM: detecting DDoS attacks using machine learning approach. In\u00a0Computational Intelligence: Theories, Applications and Future Directions-Volume I\u00a0(pp. 261\u2013273). Springer, Singapore.","DOI":"10.1007\/978-981-13-1132-1_21"},{"key":"9701_CR15","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.procs.2017.09.129","volume":"115","author":"M Jabbar","year":"2017","unstructured":"Jabbar, M., & Aluvalu, R. (2017). RFAODE: A novel ensemble intrusion detection system. Procedia computer science, 115, 226\u2013234.","journal-title":"Procedia computer science"},{"key":"9701_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.20532\/cit.2016.1002701","volume":"24","author":"ST Ikram","year":"2016","unstructured":"Ikram, S. T., & Cherukuri, A. K. (2016). Improving accuracy of intrusion detection model using PCA and optimized SVM. Journal of computing and information technology, 24, 133\u2013148.","journal-title":"Journal of computing and information technology"},{"key":"9701_CR17","doi-asserted-by":"crossref","unstructured":"Fouladi, R. F., Kayatas, C. E., & Anarim, E. (2016, June). Frequency based DDoS attack detection approach using naive Bayes classification. In\u00a02016 39th International Conference on Telecommunications and Signal Processing (TSP)\u00a0(pp. 104\u2013107). IEEE.","DOI":"10.1109\/TSP.2016.7760838"},{"key":"9701_CR18","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.3233\/IDA-173493","volume":"22","author":"G Serpen","year":"2018","unstructured":"Serpen, G., & Aghaei, E. (2018). Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Intelligent Data Analysis, 22, 1101\u20131114.","journal-title":"Intelligent Data Analysis"},{"key":"9701_CR19","doi-asserted-by":"crossref","unstructured":"Vimalkumar, K., & Radhika, N. (2017, September). A big data framework for intrusion detection in smart grids using apache spark. In\u00a02017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)\u00a0(pp. 198\u2013204). IEEE.","DOI":"10.1109\/ICACCI.2017.8125840"},{"key":"9701_CR20","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00521-016-2418-1","volume":"28","author":"J Kevric","year":"2017","unstructured":"Kevric, J., Jukic, S., & Subasi, A. (2017). An effective combining classifier approach using tree algorithms for network intrusion detection. Neural Computing and Applications, 28, 1051\u20131058.","journal-title":"Neural Computing and Applications"},{"key":"9701_CR21","first-page":"446","volume":"4","author":"L Dhanabal","year":"2015","unstructured":"Dhanabal, L., & Shantharajah, S. (2015). A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. International Journal of Advanced Research in Computer and Communication Engineering, 4, 446\u2013452.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"9701_CR22","doi-asserted-by":"publisher","first-page":"13546","DOI":"10.1109\/ACCESS.2019.2893871","volume":"7","author":"D Papamartzivanos","year":"2019","unstructured":"Papamartzivanos, D., M\u00e1rmol, F. G., & Kambourakis, G. (2019). Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access, 7, 13546\u201313560.","journal-title":"IEEE Access"},{"key":"9701_CR23","doi-asserted-by":"publisher","first-page":"52843","DOI":"10.1109\/ACCESS.2018.2869577","volume":"6","author":"M Al-Qatf","year":"2018","unstructured":"Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access, 6, 52843\u201352856.","journal-title":"IEEE Access"},{"key":"9701_CR24","doi-asserted-by":"publisher","first-page":"64366","DOI":"10.1109\/ACCESS.2019.2917299","volume":"7","author":"H Yang","year":"2019","unstructured":"Yang, H., & Wang, F. (2019). Wireless network intrusion detection based on improved convolutional neural network. IEEE Access, 7, 64366\u201364374.","journal-title":"IEEE Access"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/article\/10.1007\/s11277-022-09701-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T11:51:31Z","timestamp":1660132291000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/10.1007\/s11277-022-09701-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["9701"],"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/s11277-022-09701-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2022,4,29]]},"assertion":[{"value":"3 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}