{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T16:42:16Z","timestamp":1773160936511,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001631","name":"University College Dublin, Ireland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001631","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3375878","type":"journal-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T18:01:13Z","timestamp":1710439273000},"page":"39614-39627","source":"Crossref","is-referenced-by-count":24,"title":["A Novel Approach for Real-Time Server-Based Attack Detection Using Meta-Learning"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8403-1047","authenticated-orcid":false,"given":"Furqan","family":"Rustam","sequence":"first","affiliation":[{"name":"School of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5429-9835","authenticated-orcid":false,"given":"Ali","family":"Raza","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, University Of Lahore, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5245-9024","authenticated-orcid":false,"given":"Muhammad","family":"Qasim","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, University Of Lahore, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0963-0203","authenticated-orcid":false,"given":"Sarath Kumar","family":"Posa","sequence":"additional","affiliation":[{"name":"Department of Information Science, University of Arkansas at Little Rock, Little Rock, AR, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2705-1823","authenticated-orcid":false,"given":"Anca Delia","family":"Jurcut","sequence":"additional","affiliation":[{"name":"School of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2022.126319"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MedComNet58619.2023.10168864"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.07.370"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977423"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103096"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref7","volume-title":"List of Data Breaches and Cyber Attacks in 2023","author":"Irwin","year":"2023"},{"key":"ref8","volume-title":"What is the Cost of a Data Breach in 2023?","author":"Tunggal","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISI53945.2021.9624789"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3313596"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103445"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100307"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCCC51823.2021.9478131"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-022-09704-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP54529.2022.9864361"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v12i1.4555"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA52953.2021.00126"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11223817"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2018.8586840"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref21","volume-title":"Description of Kyoto University Benchmark Data","author":"Song","year":"2006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref25","volume-title":"IDS 2018 | Datasets | Research | Canadian Institute for Cybersecurity | UNB","year":"2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103564"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108626"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/math11173724"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PST58708.2023.10320203"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3803"},{"key":"ref31","volume-title":"Packet Analysis With Wireshark","author":"Nath","year":"2015"},{"issue":"1","key":"ref32","first-page":"634","article-title":"Analisis keamanan jaringan menggunakan metode security policy development life cycle (SPDLC)","volume":"4","author":"Yunanri","year":"2023","journal-title":"KLIK, Kajian Ilmiah Informatika Komputer"},{"key":"ref33","volume-title":"Hping3 Documentation","author":"Org","year":"2023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-820488-7.00025-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-9291-4_6"},{"key":"ref36","volume-title":"Ubuntu Server Essentials","author":"Kouka","year":"2015"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/app12094184"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6621607"},{"key":"ref41","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34980-6_5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.17977\/um018v2i12019p41-46"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSMP.2018.8478522"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1175\/1\/012025"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030413"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.02.003"},{"key":"ref49","article-title":"CICIDS2017 and UNBSW-NB15","author":"Chen","year":"2023","journal-title":"IEEE DataPort"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25109-3_9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.4097\/kjae.2015.68.6.540"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10466560.pdf?arnumber=10466560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T04:34:04Z","timestamp":1725078844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10466560\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3375878","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}