<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-05-11T08:13:27.277Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:2543" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:2543</identifier>
                <datestamp>2014-10-16T11:07:51Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Application of Hybrid Incremental Machine Learning Methods to Anomaly Based Intrusion Detection</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2014</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/2543</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://etran.etf.rs/index_e.html</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:99" confidence="-1">V. Miškovic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:6" confidence="-1">M. Milosavljević</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-2875-685X" confidence="-1">S. Adamović</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-5564-8344" confidence="-1">A. Jevremović</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">Anomaly based intrusion detection systems can detect computer systems misuse based on network and system behaviour where the type of misuse isn’t previously known. Different machine learning methods explore different hypothesis spaces, use different search strategies, different sets of features, and are appropriate for different types of problems. Their combination or integration usually gives better performance than using each individual machine learning method on its own. Hybrid models can reduce individual limitations of basic models and can exploit their different generalization mechanisms. In this paper we compare performances of explicit, implicit, and hybrid machine learning models in several publicly available intrusion detection problems. Their applicability to mobile and cloud computing is briefly analyzed. Machine learning methods in use areprovided by the Weka/MOA and R/Revolution environments</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">VII2.3.1</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">6</dim:field>
                    <dim:field mdschema="dc" element="source">Proceedings of 1st International Conference on Electrical, Electronic and Computing Engineering IcETRAN 2014</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
