{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T16:44:47Z","timestamp":1751388287299,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3248261","type":"journal-article","created":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T18:44:42Z","timestamp":1677264282000},"page":"20351-20364","source":"Crossref","is-referenced-by-count":3,"title":["A Quantitative Logarithmic Transformation-Based Intrusion Detection System"],"prefix":"10.1109","volume":"11","author":[{"given":"Blue","family":"Lan","sequence":"first","affiliation":[{"name":"Curelan Technology Company Ltd., Kaohsiung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6067-9068","authenticated-orcid":false,"given":"Ta-Chun","family":"Lo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Cheng Kung University, Tainan, Taiwan"}]},{"given":"Rico","family":"Wei","sequence":"additional","affiliation":[{"name":"Curelan Technology Company Ltd., Kaohsiung, Taiwan"}]},{"given":"Heng-Yu","family":"Tang","sequence":"additional","affiliation":[{"name":"Curelan Technology Company Ltd., Kaohsiung, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3828-9113","authenticated-orcid":false,"given":"Ce-Kuen","family":"Shieh","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, National Cheng Kung University, Tainan, Taiwan"}]}],"member":"263","reference":[{"volume-title":"The Active Adversary Playbook 2021","year":"2021","author":"Shier","key":"ref1"},{"volume-title":"Insider Threat Detection with NetFlow","year":"2019","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icinis.2010.9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/iscas51556.2021.9401087"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1844-5_24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117083"},{"volume-title":"New MrbMiner Malware Has Infected Thousands of MSSQL Databases","year":"2020","author":"Cimpanu","key":"ref7"},{"volume-title":"How a Major Oil Pipeline Got Held for Ransom","year":"2021","author":"Morrison","key":"ref8"},{"volume-title":"Meat Supplier JBS Paid Ransomware Hackers 11 Million","year":"2021","author":"Collier","key":"ref9"},{"volume-title":"Kaseya Ransomware Attackers Demand 70 Million, Claim They Infected Over a Million Devices","year":"2021","author":"Lawler","key":"ref10"},{"volume-title":"Esync Technology","year":"2022","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6639714"},{"key":"ref13","first-page":"81","article-title":"Efficient modelling of ICS communication for anomaly detection using probabilistic automata","volume-title":"Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manag. (IM)","author":"Matousek"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPSISA52974.2021.00024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/iri51335.2021.00030"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3050091"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/csci54926.2021.00270"},{"key":"ref18","article-title":"Feature analysis for machine learning-based IoT intrusion detection","author":"Sarhan","year":"2021","journal-title":"arXiv:2108.12732"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137318"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSE53436.2021.00033"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09691-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS53099.2021.9660294"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470065"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/bibe.2014.73"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100462"},{"key":"ref26","article-title":"Network security modeling using NetFlow data: Detecting botnet attacks in IP traffic","author":"Subramaniam","year":"2021","journal-title":"arXiv:2108.08924"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9421-4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3425401"},{"key":"ref29","first-page":"521","article-title":"Real-time pattern detection in IP flow data using apache spark","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manag. (IM)","author":"Cermak"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2021.3103968"},{"volume-title":"Mikrotik Blacklist Result Example RSC","year":"2022","author":"Krsmanovic","key":"ref31"},{"volume-title":"Ciarmy Bad IPS","year":"2022","key":"ref32"},{"volume-title":"Docker Service Scanner Registered on VirusTotal","year":"2020","key":"ref33"},{"volume-title":"Five Stages of a Web Malware Attack","year":"2016","author":"McCormack","key":"ref34"},{"volume-title":"Equifax to Pay Up to 700 Million in Data Breach Settlement","year":"2019","author":"Schneider","key":"ref35"},{"volume-title":"Hackers Steal 6TB of Data From Enterprise Software Developer Citrix","year":"2019","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3009843"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102767"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2895334"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107247"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107042"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1192\/1\/012018"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10050849.pdf?arnumber=10050849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:25:52Z","timestamp":1707848752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10050849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3248261","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}