{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:22:21Z","timestamp":1730193741105,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,28]],"date-time":"2020-11-28T00:00:00Z","timestamp":1606521600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,28]]},"DOI":"10.1109\/acit50332.2020.9299965","type":"proceedings-article","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T20:37:09Z","timestamp":1609792629000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["A Hybrid Model for Anomaly-Based Intrusion Detection in Complex Computer Networks"],"prefix":"10.1109","author":[{"given":"Danijela","family":"Protic","sequence":"first","affiliation":[]},{"given":"Miomir","family":"Stankovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Data duplication: an imbalance problem?","author":"kolez","year":"2003","journal-title":"ICML 2003 Workshop on Learning from Imbalanced Data Sets"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.490"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.proeng.2012.01.827","article-title":"A hybrid inteligent approach for network intrusion detection","volume":"30","author":"panda","year":"2012","journal-title":"Procedia Engineering"},{"key":"ref32","first-page":"1","article-title":"LevenbergMarqyardt training industrial electronic handbook","author":"you","year":"2011","journal-title":"Intelligent Systems"},{"journal-title":"Numerical models for submerged breakwaters","year":"2016","author":"ahmadian","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/0111030"},{"key":"ref37","article-title":"Correlation definitions, examples & interpretations","author":"mcleod","year":"2018","journal-title":"Simply Psychology"},{"key":"ref36","first-page":"1372","article-title":"Anomaly intrusion detection techniques: A brief review","volume":"5","author":"jain","year":"2014","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.005"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1515\/JISYS.1999.9.1.1"},{"journal-title":"Neural Networks A Comprehensive Foundation","year":"1994","author":"haykin","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1090\/qam\/10666"},{"key":"ref2","first-page":"44","article-title":"A. An Intelligent CRF Based Feature Selection for Effective Intrusion Detection","author":"ganpathy","year":"2015","journal-title":"The International Arab Journal of Information Technology"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176343886"},{"key":"ref20","article-title":"Comparision of feature reduction techniques for the binominal classification of network traffic","volume":"3","author":"amar","year":"2015","journal-title":"Journal Of Data Analysis And Information Processing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg68-27319"},{"key":"ref21","article-title":"Pattern classification 2nd ed","author":"dudani","year":"2001","journal-title":"John Wiley & Sons"},{"key":"ref24","first-page":"174","article-title":"Research of intrusion detection systems based on neural networks","author":"jinguo","year":"0","journal-title":"Communication Software and Networks (ICCSN) 2011 IEEE 3rd International Conference On IEEE"},{"key":"ref23","first-page":"109","article-title":"Improvement and comparition of weighted k nearest neighbors classifiers for model selection","volume":"10","author":"zhang","year":"0","journal-title":"Journal of Software Engineering"},{"journal-title":"Compressed sensing in Li-Fi and Wi-Fi networks","year":"2017","author":"benslama","key":"ref26"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back-propagation errors","author":"rumelhart","year":"1986","journal-title":"Nature"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.26417\/ejef.v4i1.p7-13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/72.329697"},{"key":"ref40","first-page":"31","article-title":"Intrusion Detection Based on Artificial Intelligence Technique","volume":"2","author":"singh","year":"2014","journal-title":"International Journal of Computer Science Trends and Technology"},{"key":"ref11","first-page":"1","article-title":"Building an intrusion detection system using a filter-based feature selection algorithm","author":"ambusaidi","year":"2014","journal-title":"IEEE Transactions on Computers"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4236\/jdaip.2015.32002"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-5225-3935-3","article-title":"A novel algorithm for Network Anomaly Detection using Adaptive Machine Learning, Chapter","author":"ashok kumar","year":"2018","journal-title":"Progress in Advanced Computing and Electrical Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3418748"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010173"},{"journal-title":"Feature selection using mutual information in network intrusion detection system","year":"2015","author":"ambusaidi","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.26417\/ejef.v2i3.p101-106"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2009.06.019","article-title":"The use of computational intelligence in intrusion detection systems. A review","volume":"10","author":"shelly xiaonan","year":"2010","journal-title":"Applied Soft Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.015"},{"key":"ref4","first-page":"760","article-title":"A Proposal for Recommendation of Feature Selection Algorithm based on Data Set Characteristics","volume":"22","author":"goswami","year":"2016","journal-title":"Journal of Universal Computer Science"},{"key":"ref3","first-page":"728","article-title":"Intrusion Detection using Artificial Neural Networks with Best Set of Features","volume":"12","author":"jayakumar","year":"2015","journal-title":"The International Arab Journal of Information Technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2012.V2.250"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00017-6"},{"key":"ref8","article-title":"Weighted k-nearest neighbors (WKNN)","author":"faryaneh","year":"2020","journal-title":"MATLAB Central File Exchange"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3923\/jse.2016.109.118"},{"key":"ref49","first-page":"25","article-title":"Detection of Probe Attacks Using Machine Learning Techniques","volume":"2","author":"ambedkar","year":"2015","journal-title":"International Journal of Research Studies in Computer Science and Engineering"},{"key":"ref9","first-page":"1","author":"yu","year":"2010","journal-title":"Chapter in Intelligent Systems"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg63-7529"},{"key":"ref45","first-page":"1","article-title":"Feed forward neural networks with random weights","author":"schmidt","year":"0","journal-title":"The Nederlends Delft University of Technology Faculty of Applied Phisics 1992 0-8186-2915-0\/92"},{"key":"ref48","first-page":"327","article-title":"A new damping strategy of Levenberg-Marquardt algorithm for multilayer perceptrons","volume":"4","author":"young-tae","year":"2011","journal-title":"Neural Network World"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.2307\/1403504"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1978672.1978676"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.5937\/vojtehg66-16670"},{"key":"ref44","first-page":"733","article-title":"On Speech Signal Model Identification","author":"arsenijevic","year":"1998","journal-title":"Proceedings of the XXV Yugoslav Conference SYMOPIS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2018.91006"}],"event":{"name":"2020 21st International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2020,11,28]]},"location":"Giza, Egypt","end":{"date-parts":[[2020,11,30]]}},"container-title":["2020 21st International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9299884\/9299962\/09299965.pdf?arnumber=9299965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:56:01Z","timestamp":1656345361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9299965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,28]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/acit50332.2020.9299965","relation":{},"subject":[],"published":{"date-parts":[[2020,11,28]]}}}