{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:54:18Z","timestamp":1774929258447,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3629761","type":"journal-article","created":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:54:28Z","timestamp":1762455268000},"page":"190859-190871","source":"Crossref","is-referenced-by-count":3,"title":["Prompt Engineering-Based Network Intrusion Detection System"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2100-269X","authenticated-orcid":false,"given":"Sunit","family":"Kumar Nandi","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]},{"given":"Ritesh","family":"Ratti","sequence":"additional","affiliation":[{"name":"Temus Private Ltd., Mapletree Business City, Pasir Panjang Rd, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0484-2144","authenticated-orcid":false,"given":"Sanasam","family":"Ranbir Singh","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5869-1057","authenticated-orcid":false,"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111734"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref3","first-page":"8821","article-title":"Zero-shot text-to-image generation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ramesh"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICREST.2019.8644161"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2007.22"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89912-7_1"},{"key":"ref7","article-title":"A signature-based intrusion detection system for the Internet of Things","volume":"32","author":"Ioulianou","year":"2018","journal-title":"Inf. Commun. Technol. Form"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2973992"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5120\/3399-4730"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00026-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EASCT59475.2023.10393509"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3565477.3569152"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075503"},{"key":"ref15","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Brown"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(97)00014-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4943509"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref20","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51630-6_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3639478.3643108"},{"key":"ref23","article-title":"RAGLog: Log anomaly detection using retrieval augmented generation","author":"Pan","year":"2023","journal-title":"arXiv:2311.05261"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys60770.2023.00045"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i3.27963"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2017.8319360"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637226"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/d19-1410"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.365"},{"key":"ref31","volume-title":"FTP Patator and Ssh Patator","year":"2014"},{"key":"ref32","volume-title":"Editcap","year":"2013"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3139\/9783446472440.010"},{"key":"ref34","first-page":"38","article-title":"Transformers: State-of-the-art natural language processing","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process., Syst. Demonstrations","author":"Wolf"},{"key":"ref35","volume-title":"Prompt Engineering Based Network Intrusion Detection System Source Code, Datasets, and Experiment Results","author":"Nandi","year":"2025"},{"issue":"70","key":"ref36","first-page":"1","article-title":"Scaling instruction-finetuned language models","volume":"25","author":"Chung","year":"2022","journal-title":"J. Mach. Learn. Res."},{"key":"ref37","article-title":"Mistral 7B","author":"Jiang","year":"2023","journal-title":"arXiv:2310.06825"},{"key":"ref38","article-title":"The llama 3 herd of models","author":"Grattafiori","year":"2024","journal-title":"arXiv:2407.21783"},{"key":"ref39","article-title":"Gemma: Open models based on Gemini research and technology","author":"Team","year":"2024","journal-title":"arXiv:2403.08295"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00025"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.7753\/IJCATR1001.1008"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE52056.2021.9514161"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.33851\/jmis.2019.6.4.165"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11230552.pdf?arnumber=11230552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T18:51:13Z","timestamp":1763146273000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11230552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3629761","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}