{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T23:54:37Z","timestamp":1747180477707,"version":"3.40.5"},"reference-count":47,"publisher":"Informa UK Limited","issue":"4","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1080\/24751839.2023.2215135","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T13:45:34Z","timestamp":1684849534000},"page":"437-461","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Abnormal network packets identification using header information collected from Honeywall architecture"],"prefix":"10.1080","volume":"7","author":[{"given":"Kha Van","family":"Nguyen","sequence":"first","affiliation":[{"name":"Can Tho Department of Science and Technology, Can Tho, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1386-1390","authenticated-orcid":false,"given":"Hai Thanh","family":"Nguyen","sequence":"additional","affiliation":[{"name":"College of Information and Communication Technology, Can Tho University, Can Tho, Vietnam"}]},{"given":"Thang Quyet","family":"Le","sequence":"additional","affiliation":[{"name":"College of Information and Communication Technology, Can Tho University, Can Tho, Vietnam"}]},{"given":"Quang Nhat Minh","family":"Truong","sequence":"additional","affiliation":[{"name":"College of Information Technology, Can Tho University of Technology, Can Tho, Vietnam"}]}],"member":"301","published-online":{"date-parts":[[2023,5,23]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.14704\/WEB\/V17I2\/WEB17039"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.102957"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECTI-CON49241.2020.9158222"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08701-y"},{"issue":"2","key":"e_1_3_4_6_1","article-title":"Wireless network monitoring using snort","volume":"2","author":"Farey G. L. U.","year":"2023","unstructured":"Farey, G. L. U., Adha, M., Kurniawan, S. Y., Salsabilla, C. A., Rahman, A., & Reza, M. (2023). Wireless network monitoring using snort. JComce - Journal of Computer Science, 2(2). https:\/\/jurnal.teknologiriau.net\/index.php\/jcomce\/article\/view\/11.","journal-title":"JComce - Journal of Computer Science"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.34"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106669"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071151"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCA.2016.7578899"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5272"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909701"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963407"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101851"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.08.036"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3038991"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102598"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAT.2021.116009"},{"key":"e_1_3_4_19_1","unstructured":"Nguyen T. H. Prifti E. Sokolovska N. & Zucker J. (2019 3). Disease prediction using synthetic image representations of metagenomic data and convolutional neural networks. In Proceedings of the 13th IEEE-RIVF international conference on computing and communication technologies (pp. 231\u2013236). IEEE."},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/KSE.2019.8919295"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/KSE.2019.8919494"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-191448"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIE57029.2022.00024"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9065249"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2023.128505"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-74837-1_12"},{"key":"e_1_3_4_27_1","volume-title":"Virtual honeypots","author":"Provos N.","year":"2007","unstructured":"Provos, N., & Holz, T. (2007, July). Virtual honeypots. Addison-Wesley Educational."},{"issue":"1","key":"e_1_3_4_28_1","article-title":"Network security implementation with snort-based intrusion detection system using windows 10","volume":"1","author":"Putri A. A.","year":"2023","unstructured":"Putri, A. A., Agustina, C., Fauzan, H., Saputra, M. R. E., Erdiansyah, M., & Wardani, P. S. (2023, January). Network security implementation with snort-based intrusion detection system using windows 10. JComce - Journal of Computer Science, 1(1). https:\/\/jurnal.teknologiriau.net\/index.php\/jcomce\/article\/view\/49.","journal-title":"JComce - Journal of Computer Science"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.08.021"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107859"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5685-9_46"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7258-9_13"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102460"},{"key":"e_1_3_4_34_1","doi-asserted-by":"crossref","unstructured":"Song Y. Bu B. & Yang X. (2020). Hybrid intrusion detection with decision tree and critical state analysis for CBTC. In B. Liu L. Jia Y. Qin Z. Liu L. Diao & M. An (Eds.) Lecture notes in electrical engineering (pp. 153\u2013161). Springer Singapore.","DOI":"10.1007\/978-981-15-2914-6_16"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108017"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v52i0.200"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-804018-8.00013-9"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.137"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2016.7561088"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/icnisc.2016.028"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.3233\/AIC-170729"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00049"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/Access.6287639"},{"key":"e_1_3_4_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00874-8"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108212"},{"key":"e_1_3_4_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204690"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107049"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2023.2215135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T09:17:43Z","timestamp":1698398263000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2023.2215135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,10,2]]}},"alternative-id":["10.1080\/24751839.2023.2215135"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2023.2215135","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"type":"print","value":"2475-1839"},{"type":"electronic","value":"2475-1847"}],"subject":[],"published":{"date-parts":[[2023,5,23]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-12-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}