{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T10:43:30Z","timestamp":1772361810582,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada (NSERC) Engage Grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3093830","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T19:49:17Z","timestamp":1625168957000},"page":"94352-94370","source":"Crossref","is-referenced-by-count":28,"title":["Building an Intrusion Detection System to Detect Atypical Cyberattack Flows"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7651-1024","authenticated-orcid":false,"given":"Ulya","family":"Sabeel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6107-7728","authenticated-orcid":false,"given":"Shahram Shah","family":"Heydari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5892-632X","authenticated-orcid":false,"given":"Khalid","family":"Elgazzar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5960-6942","authenticated-orcid":false,"given":"Khalil","family":"El-Khatib","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Efficient hyperparameter optimization for deep learning algorithms using deterministic RBF surrogates","author":"ilievski","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref38","author":"titov","year":"2021","journal-title":"Light"},{"key":"ref33","author":"paul","year":"2021","journal-title":"Beginner&#x2019;s Guide to Feature Selection in Python"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00087"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/en12071223","article-title":"Research on network intrusion detection based on incremental extreme learning machine and adaptive principal component analysis","volume":"12","author":"gao","year":"2019","journal-title":"Energies"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNEA.2017.57"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/471371"},{"key":"ref36","author":"to","year":"2021","journal-title":"Chi-Square Statistic How to Calculate it\/Distribution"},{"key":"ref35","first-page":"3407","article-title":"Feature engineering for predictive modeling using reinforcement learning","author":"khurana","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref34","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"guyon","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00346-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-017-1085-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983568"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9064976"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182099"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001350"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348167"},{"key":"ref26","article-title":"Should I raise the red flag? A comprehensive survey of anomaly scoring methods toward mitigating false alarms","author":"zohrevand","year":"2019","journal-title":"arXiv 1904 06646"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022855"},{"key":"ref50","year":"2021","journal-title":"Slowhttptest Package Description"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref59","article-title":"Evaluation of requirements management tools with support for traceability-based change impact analysis","author":"abma","year":"2009"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/RUSAUTOCON.2019.8867696"},{"key":"ref57","year":"2021","journal-title":"A Python Automated Machine Learning Tool That Optimizes Machine Learning Pipelines Using Genetic Programming"},{"key":"ref56","year":"2021","journal-title":"Sklearn svm linearSVC"},{"key":"ref55","year":"2019","journal-title":"Cicflowmeter (formerly iscxflowmeter)"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00206"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICTS.2017.8265667"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/fi9040081"},{"key":"ref40","first-page":"3","author":"feurer","year":"2019","journal-title":"Hyperparameter Optimization"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810267"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00840-6_16"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00059"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"322","DOI":"10.3390\/electronics8030322","article-title":"Features dimensionality reduction approaches for machine learning based network intrusion detection","volume":"8","author":"abdulhammed","year":"2019","journal-title":"Electronics"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.3390\/s16101701","article-title":"A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks","volume":"16","author":"ma","year":"2016","journal-title":"SENSORS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031206"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737507"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"ref8","article-title":"Network anomaly detection: Flow-based or packet-based approach?","author":"nguyen","year":"2010","journal-title":"arXiv 1007 1266"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863036"},{"key":"ref49","year":"2021","journal-title":"Data Preprocessing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SmartNets48225.2019.9069788"},{"key":"ref46","year":"2021","journal-title":"Understanding Q-Q Plots"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.11.008"},{"key":"ref48","author":"bhandari","year":"2021","journal-title":"Feature Scaling for Machine Learning"},{"key":"ref47","year":"2021","journal-title":"Normalization"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref41","article-title":"CMA-ES for hyperparameter optimization of deep neural networks","author":"loshchilov","year":"2016","journal-title":"arXiv 1604 07269"},{"key":"ref44","first-page":"312","article-title":"Ensemble learning","author":"brown","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref43","author":"civin","year":"2021","journal-title":"Explainable AI Could Reduce the Impact of Biased Algorithms"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09469900.pdf?arnumber=9469900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T20:51:26Z","timestamp":1643316686000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9469900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3093830","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}