{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:51:04Z","timestamp":1775155864560,"version":"3.50.1"},"reference-count":321,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Qatar National Library"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2916648","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T19:53:12Z","timestamp":1557863592000},"page":"65579-65615","source":"Crossref","is-referenced-by-count":449,"title":["Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5015-8605","authenticated-orcid":false,"given":"Muhammad","family":"Usama","sequence":"first","affiliation":[]},{"given":"Junaid","family":"Qadir","sequence":"additional","affiliation":[]},{"given":"Aunn","family":"Raza","sequence":"additional","affiliation":[]},{"given":"Hunain","family":"Arif","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3110-2782","authenticated-orcid":false,"given":"Kok-lim Alvin","family":"Yau","sequence":"additional","affiliation":[]},{"given":"Yehia","family":"Elkhatib","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Hussain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0903-1204","authenticated-orcid":false,"given":"Ala","family":"Al-Fuqaha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289247"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7414141"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/163184"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2015.7149014"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264886"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17091-6_26"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2016.39"},{"key":"ref272","first-page":"3159","article-title":"Divvy: Fast and intuitive exploratory data analysis","volume":"14","author":"lewis","year":"2013","journal-title":"J Mach Learn Res"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.1095"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129589"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1504\/IJBDI.2016.073903"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.35"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2048302"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/CDAN.2016.7570937"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.443"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2562259"},{"key":"ref39","author":"xie","year":"2017","journal-title":"IoT data analytics using deep learning"},{"key":"ref38","author":"moysen","year":"2017","journal-title":"From 4G to 5G Self-Organized Network Management Meets Machine Learning"},{"key":"ref33","first-page":"1","article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","author":"tuor","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref32","article-title":"Deep learning approach for intrusion detection system (IDS) in the Internet of Things (IoT) network using gated recurrent neural networks (GRU)","author":"putchala","year":"2017"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.39"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966342"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1007\/BF03219975"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2716191"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31863-9_10"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2017.7920746"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.167"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.310"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2012.6181017"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.2991\/cnct-16.2017.13"},{"key":"ref287","first-page":"27","article-title":"ATLANTIC: A framework for anomaly traffic detection, classification, and mitigation in SDN","author":"da silva","year":"2016","journal-title":"Proc IEEE\/IFIP Netw Oper Manage Symp (NOMS)"},{"key":"ref286","author":"goswami","year":"2017","journal-title":"Intelligent Threat-Aware Response System in Software-Defined Networks"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694702"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371572"},{"key":"ref181","author":"aminanto","year":"2016","journal-title":"Deep learning-based feature selection for intrusion detection system in transport layer"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/NSEC.2014.6998241"},{"key":"ref180","author":"gonzalez","year":"2017","journal-title":"Net2Vec Deep learning for the network"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2014.14"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1223682"},{"key":"ref184","first-page":"16","article-title":"Multiple self-organizing maps for intrusion detection","author":"rhodes","year":"2000","journal-title":"Proc 23rd Nat Inf Syst Secur Conf"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.09.045"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925498"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.05.003"},{"key":"ref188","first-page":"1","article-title":"Dynamic intrusion detection using self-organizing maps","author":"lichodzijewski","year":"2002","journal-title":"Proc 14th Annu Can Inf Technol Secur Symp (CITSS)"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007776"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/11553595_10"},{"key":"ref28","author":"mohammad lotfollahi","year":"2017","journal-title":"Deep packet A novel approach for encrypted traffic classification using deep learning"},{"key":"ref27","first-page":"215","article-title":"An analysis of single-layer networks in unsupervised feature learning","author":"coates","year":"2011","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1994-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-0834-5"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-015-9438-6"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/atsip.2013.9"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600317WC"},{"key":"ref26","volume":"207","author":"guyon","year":"2008","journal-title":"Feature Extraction Foundations and Applications"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2709742"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.006"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-1712-2.ch010"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1037\/h0042519"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2467174"},{"key":"ref51","volume":"3","author":"haykin","year":"2009","journal-title":"Neural Networks and Learning Machines"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.3390\/fi9040093"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.062613.00014"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.36"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2618909"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0667-5"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335437"},{"key":"ref153","article-title":"Analyzing large scale Wi-Fi data using supervised and unsupervised learning techniques","author":"sarshar","year":"2017"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_68"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47887-6_53"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6740585"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963801"},{"key":"ref152","author":"rajendran","year":"2017","journal-title":"Distributed Deep Learning Models for Wireless Signal Classification with Low-Cost Spectrum Sensors"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00116"},{"key":"ref151","author":"ossia","year":"2017","journal-title":"A hybrid deep learning architecture for privacy-preserving mobile analytics"},{"key":"ref146","first-page":"174","article-title":"A SOM and PNN model for network traffic classification","volume":"55","author":"zhou","year":"2017","journal-title":"Bolet&#x00ED;n T&#x00E9;cnico"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref148","first-page":"717","article-title":"A hybrid autoencoder and density estimation model for anomaly detection","author":"nicolau","year":"2016","journal-title":"Proc Int Conf Parallel Problem Solving Nature"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.20532\/cit.2016.1002701"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785327"},{"key":"ref59","first-page":"448","article-title":"Deep Boltzmann machines","author":"salakhutdinov","year":"2009","journal-title":"Proc Int Conf Artif Intell Statist (AISTATS)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1668"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44668-0_95"},{"key":"ref56","author":"pascanu","year":"2013","journal-title":"How to construct deep recurrent neural networks"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/165146"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553453"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-802806-3.00007-5"},{"key":"ref52","first-page":"22","author":"carpenter","year":"2010","journal-title":"Adaptive Resonance Theory"},{"key":"ref40","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.98"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.05.220"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727646"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2015.267"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2016.7925139"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref161","first-page":"59","article-title":"Histogram-based outlier score (HBOS): A fast unsupervised anomaly detection algorithm","author":"goldstein","year":"2012","journal-title":"Proceedings of the Posters and Demo Track"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627557"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2507798"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.04.016"},{"key":"ref5","first-page":"1","article-title":"The future of networking, and the past of protocols","volume":"20","author":"shenker","year":"2011","journal-title":"Open Networking Summit"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67235-9_9"},{"key":"ref159","first-page":"1","article-title":"Behavior analysis using unsupervised anomaly detection","author":"goldstein","year":"2014","journal-title":"Proc 10th Joint Workshop Mach Perception Robot (MPR)"},{"key":"ref7","author":"feamster","year":"2017","journal-title":"Why (and how) networks should run themselves"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(98)00030-7"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"},{"key":"ref46","first-page":"265","article-title":"On optimization methods for deep learning","author":"ngiam","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn (ICML)"},{"key":"ref45","first-page":"1137","article-title":"Efficient learning of sparse representations with an energy-based model","author":"poultney","year":"2006","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"key":"ref47","author":"doersch","year":"2016","journal-title":"Tutorial on variational autoencoders"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref44","first-page":"153","article-title":"Greedy layer-wise training of deep networks","volume":"19","author":"bengio","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.876059"},{"key":"ref321","article-title":"Advice for applying machine learning","author":"ng","year":"2011"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(96)00038-0"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737793"},{"key":"ref71","first-page":"333","article-title":"Unsupervised anomaly detection in network intrusion detection using clusters","volume":"38","author":"leung","year":"2005","journal-title":"Proc 28th Australas Conf Comput Sci"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281210"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1145\/2347736.2347755"},{"key":"ref76","first-page":"766","article-title":"Partitional clustering","author":"jin","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0812-2"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.44"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1016\/j.jneumeth.2016.10.008"},{"key":"ref74","first-page":"81","article-title":"Bayesian nonparametric models","author":"orbanz","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1009213726"},{"key":"ref75","article-title":"Bayesian nonparametric clustering of network traffic data","author":"kurt","year":"0"},{"key":"ref314","author":"grosse","year":"2016","journal-title":"Adversarial perturbations against deep neural networks for malware classification"},{"key":"ref313","author":"hu","year":"2017","journal-title":"Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"},{"key":"ref312","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref78","first-page":"360","article-title":"Network traffic classification using K-Means clustering","author":"yingqiu","year":"2007","journal-title":"Proc 2nd Int Multi-Symp Comput Comput Sci (IMSCCS)"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2017.7947005"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/IFITA.2009.34"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2619719"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600374CM"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.05.040"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069422"},{"key":"ref61","first-page":"45","article-title":"A neural architecture based on the adaptive resonant theory and recurrent neural networks","volume":"4","author":"henrique","year":"2007","journal-title":"Proc IJCSA"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868376"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2014.6918997"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.019"},{"key":"ref64","first-page":"9","article-title":"Unsupervised and semi-supervised clustering: A brief survey","volume":"1","author":"grira","year":"2004","journal-title":"A Review of Machine Learning Techniques for Processing Multimedia Content"},{"key":"ref307","first-page":"161","article-title":"A transfer learning approach for cache-enabled wireless networks","author":"ba?tu?","year":"2015","journal-title":"Proc Int Symp Model Optim Mobile Ad-Hoc Wireless Netw (WiOpt)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28349-8_2"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2016.7886051"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_21"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0963-3"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.845141"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref69","article-title":"Comparison of density-based clustering algorithms","author":"rehman","year":"2005"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2017.02.001"},{"key":"ref309","article-title":"System and method for network address administration and management in federated cloud computing networks","author":"gokhale","year":"2017"},{"key":"ref308","author":"kone?n?","year":"2016","journal-title":"Federated learning Strategies for improving communication efficiency"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.73"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2007.4371391"},{"key":"ref199","first-page":"1","article-title":"2005 CSI\/FBI computer crime and security survey","volume":"21","author":"gordon","year":"2005","journal-title":"Comput Secur"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.016"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967988"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539307002568"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2581-z"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-5014-9_13"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.18178\/JACN.2016.4.1.198"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.05.002"},{"key":"ref93","first-page":"26","article-title":"A feature clustering based dimensionality reduction for intrusion detection (FCBDR)","volume":"12","author":"kumar","year":"2017","journal-title":"Internat J Computer Inf Sci"},{"key":"ref191","first-page":"65","article-title":"Neural network techniques for intrusion detection","author":"golovko","year":"2006","journal-title":"Proc Int Conf Artif Neural Netw"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3098593.3098595"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.849"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.07.038"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2650206"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2011.11.012"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9469.2007.00573.x"},{"key":"ref97","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","author":"bishop","year":"1995","journal-title":"Neural Networks for Pattern Recognition"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/34.990138"},{"key":"ref81","first-page":"1","article-title":"Anomaly based intrusion detection using hybrid learning approach of combining k-medoids clustering and naive Bayes classification","author":"chitrakar","year":"2012","journal-title":"Proc 8th Int Conf Wireless Commun Netw Mobile Comput (WiCOM)"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2008.17"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0610537104"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/AHICI.2012.6408446"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098049"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2006.253508"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143369"},{"key":"ref87","first-page":"6551","article-title":"Comparative analysis of clustering techniques in network traffic faults classification","volume":"5","author":"adda","year":"2017","journal-title":"Int J Innov Res Comput Commun Eng"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1929"},{"key":"ref200","year":"2016","journal-title":"Internet Security Threat Report"},{"key":"ref101","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","author":"lee","year":"2001","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.51"},{"key":"ref209","article-title":"A study of intrusion detection system for cloud network using FC-ANN algorithm","author":"chaturvedi","year":"2016"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1903"},{"key":"ref204","first-page":"263","article-title":"Traffic data repository at the WIDE project","author":"sony","year":"2000","journal-title":"Proc USENIX Annu Technical Conf Freenix Track"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.01.009"},{"key":"ref207","first-page":"9","article-title":"Application of machine learning approaches in intrusion detection system: A survey","volume":"4","author":"haq","year":"2015","journal-title":"Int J Adv Res Artificial Intell"},{"key":"ref208","first-page":"1","article-title":"Artificial immune system based intrusion detection: Innate immunity using an unsupervised learning approach","volume":"8","author":"hosseinpour","year":"2014","journal-title":"Int J Digit Content Technol Appl"},{"key":"ref205","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1007\/978-1-4614-6170-8_354","article-title":"Network anomaly detection using co-clustering","author":"papalexakis","year":"2014","journal-title":"Encyclopedia of Social Network Analysis and Mining"},{"key":"ref206","article-title":"Application of hybrid incremental machine learning methods to anomaly based intrusion detection","author":"mi\u0161kovic","year":"2014","journal-title":"Proc 1st Int Conf Elect Electron Comput Eng (IcETRAN)"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2336610"},{"key":"ref210","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","article-title":"A survey of intrusion detection techniques in cloud","volume":"36","author":"modi","year":"2013","journal-title":"J Netw Comput Appl"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.01.012"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2014.25"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2622240"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2689001"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD-SAWN.2005.23"},{"key":"ref218","first-page":"75","article-title":"Improving life time of wireless sensor networks using neural network based classification techniques with cooperative routing","volume":"2","author":"akojwar","year":"2008","journal-title":"Int J Commun"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/157453"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2002.1167055"},{"key":"ref222","first-page":"42","article-title":"Energy based clustering self organizing map protocol for extending wireless sensor networks lifetime and coverage","volume":"1","author":"enami","year":"2010","journal-title":"Canadain Journal on Multimedia and Wireless Networks"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/ISCCSP.2008.4537271"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288409"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1313226"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2010.5637779"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.913803"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853416"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2006.56"},{"key":"ref223","first-page":"31","article-title":"Power control and clustering in wireless sensor networks","author":"dehni","year":"2005","journal-title":"Proc 10th IFIP Annu Medit Ad Hoc Netw Workshop"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0546-3"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917576"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.011"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/KST.2016.7440488"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1345742"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.008"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.06.013"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"2323","DOI":"10.1126\/science.290.5500.2323","article-title":"Nonlinear dimensionality reduction by locally linear embedding","volume":"290","author":"roweis","year":"2000","journal-title":"Science"},{"key":"ref134","first-page":"257","article-title":"Curse of dimensionality","author":"keogh","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057089"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v10n2p39"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/NOC.2012.6249939"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2013.4305"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2015.08.007"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(01)00194-3"},{"key":"ref239","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1504\/IJSNET.2010.034619","article-title":"MRL-CC: A novel cooperative communication protocol for QoS provisioning in wireless sensor networks","volume":"8","author":"xuedong","year":"2010","journal-title":"Int J Sensor Netw"},{"key":"ref238","first-page":"1","article-title":"Distributed spectrum management based on reinforcement learning","author":"francisco","year":"2009","journal-title":"Proc 14th Int Conf Cognit Radio Oriented Wireless Netw Commun"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21771-5_16"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/MedHocNet.2014.6849102"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7025152"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654982"},{"key":"ref136","first-page":"856","article-title":"Feature selection for high-dimensional data: A fast correlation-based filter solution","volume":"3","author":"yu","year":"2003","journal-title":"Proc ICMLC Int Conf"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5725-8_7"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.2172\/15002155"},{"key":"ref137","first-page":"931","article-title":"Dimension reduction vs. variable selection","author":"hartmann","year":"2004","journal-title":"Proc International Workshop on Parallel Computing"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1162\/089976698300017953"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1989.10478797"},{"key":"ref142","author":"lee","year":"2002","journal-title":"Estimations of Principal Curves"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289694"},{"key":"ref2","author":"latif","year":"2017","journal-title":"Artificial intelligence as an enabler for cognitive self-organizing future networks"},{"key":"ref144","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-5542-3_2"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1962"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2004.842418"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486020"},{"key":"ref243","author":"o\u2019shea","year":"2017","journal-title":"An introduction to machine learning communications systems"},{"key":"ref244","author":"o\u2019shea","year":"2017","journal-title":"Deep Learning Based MIMO Communications"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10063"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2455521"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2971"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2597125"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/SPLIM.2016.7528397"},{"key":"ref249","author":"hou","year":"2011","journal-title":"Svm and dimensionality reduction in cognitive radio with experimental validation"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566768"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050335"},{"key":"ref107","first-page":"287","article-title":"A dynamic relational infinite feature model for longitudinal social networks","volume":"11","author":"foulds","year":"2011","journal-title":"Proc AISTATS"},{"key":"ref106","first-page":"1","article-title":"Latent set models for two-mode network data","author":"dubois","year":"2011","journal-title":"Proc ICWSM"},{"key":"ref105","author":"wang","year":"2016","journal-title":"Towards bayesian deep learning A survey"},{"key":"ref104","article-title":"A family of algorithms for approximate Bayesian inference","author":"minka","year":"2001"},{"key":"ref103","author":"beal","year":"2003","journal-title":"Variational algorithms for approximate Bayesian inference"},{"key":"ref102","article-title":"Optimal learning: Computational procedures for Bayes-adaptive Markov decision processes","author":"duff","year":"2002"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_82"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2008.04.006"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.9.5.1234-1240"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2015.7492755"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.69"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0068"},{"key":"ref255","author":"niyaz","year":"2016","journal-title":"A deep learning based ddos detection system in software-defined networking (sdn)"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080182"},{"key":"ref253","first-page":"124","article-title":"Deep neural networks and transfer learning applied to multimedia Web mining","author":"l\u00f3pez-s\u00e1nchez","year":"2017","journal-title":"Proc Symp Distrib Comput Artif Intell"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/WOCC.2017.7928975"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906980"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2014.7019692"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2016EBP3239"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.100412.00017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2727878"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53806-7_8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2012.6358901"},{"key":"ref17","author":"hodo","year":"2017","journal-title":"Shallow and deep networks intrusion detection system A taxonomy and survey"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87481-2_40"},{"key":"ref18","author":"al-garadi","year":"2018","journal-title":"A survey of machine and deep learning methods for Internet of Things (IoT) security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.002"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2008.44"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.109"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ISMS.2013.56"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2010.5657833"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.1691116"},{"key":"ref120","first-page":"1","article-title":"Internet threat detection system using Bayesian estimation","author":"ishiguro","year":"2004","journal-title":"Proc 16th Annu Comput Secur Incident Handling Conf"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2006.1665221"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.823143"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.19"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947776"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/COMNETSAT.2016.7907422"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46376-6_22"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986437"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2014.6889935"},{"key":"ref265","author":"ansari","year":"2015","journal-title":"A fuzzy approach for feature evaluation and dimensionality reduction to improve the quality of Web usage mining results"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366290"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08713992.pdf?arnumber=8713992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T01:14:54Z","timestamp":1721265294000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8713992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":321,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2916648","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}