{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T15:01:40Z","timestamp":1779202900082,"version":"3.51.4"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3458903","type":"journal-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:37:31Z","timestamp":1726079851000},"page":"136805-136824","source":"Crossref","is-referenced-by-count":11,"title":["Enhancing Network Traffic Anomaly Detection: Leveraging Temporal Correlation Index in a Hybrid Framework"],"prefix":"10.1109","volume":"12","author":[{"given":"A. H.","family":"Nasreen Fathima","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Chennai Campus, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. P. Syed","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Chennai Campus, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ansam","family":"Khraisat","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Melbourne, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2847722"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2867564"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2635-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868993"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5105709"},{"issue":"6","key":"ref8","first-page":"1024","article-title":"Real-time intrusion detection using multidimensional sequence-to-sequence machine learning and adaptive stream processing","volume":"14","author":"Loganathan","year":"2018","journal-title":"Comput. Sci."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2943249"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959131"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2019.8702583"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895334"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICACS47775.2020.9055946"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-218"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/globecom38437.2019.9013302"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3140058"},{"key":"ref20","article-title":"Adversarial machine learning in network intrusion detection domain: A systematic review","author":"Alatwi","year":"2021","journal-title":"arXiv:2112.03315"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/7045823"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00448-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100112"},{"issue":"1","key":"ref24","first-page":"45","article-title":"Evaluating neural networks using bi-directional LSTM for network IDS (intrusion detection systems) in cybersecurity","volume":"2","author":"Pooja","year":"2021","journal-title":"Global Transitions Proc."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470065"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11020213"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149295"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/app12094184"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3063538"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3245413"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3158318"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3306333"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3304994"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3134186"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3220736"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140957"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3274474"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3579375.3579376"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061320"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002255"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101863"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102177"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.017"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3271866"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3211874"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10614-021-10198-3"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04484-6"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5080"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10676989.pdf?arnumber=10676989","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T11:30:19Z","timestamp":1728559819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10676989\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3458903","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}