{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:34:12Z","timestamp":1761989652444,"version":"3.28.0"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,21]]},"DOI":"10.1109\/acit53391.2021.9677375","type":"proceedings-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T16:26:35Z","timestamp":1642436795000},"page":"1-13","source":"Crossref","is-referenced-by-count":7,"title":["A Comprehensive Survey for Machine Learning and Deep Learning Applications for Detecting Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Ola M.","family":"Surakhi","sequence":"first","affiliation":[]},{"given":"Antonio Mora","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Jamoos","sequence":"additional","affiliation":[]},{"given":"Mohammad Y.","family":"Alkhanafseh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"626","DOI":"10.3390\/s21020626","article-title":"Intrusion Detection System in the Advanced Metering Infrastructure: A Cross-Layer Feature-Fusion CNN-LSTM-Based Approach","volume":"21","author":"yao","year":"2021","journal-title":"SENSORS"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/pr9050834"},{"key":"ref33","first-page":"1","article-title":"UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems","author":"moustafa","year":"2015","journal-title":"Military Communications and Information Systems Conference (MilCIS)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"year":"0","author":"stolfo","key":"ref31"},{"year":"2018","key":"ref30","article-title":"CSE-CIC-IDS2018"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1155\/2021\/5538896","article-title":"Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models","volume":"2021","author":"mahbooba","year":"2021","journal-title":"Complexity"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.3390\/s21041113","article-title":"Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods","volume":"21","author":"zhong","year":"2021","journal-title":"SENSORS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050111"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4731953"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CISCE.2019.00102"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3167918.3167951"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297230"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3184066.3184089"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04212-7_53"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/fi8030029"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.443"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98842-9_6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53396-4_15"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23851\/mjs.v28i2.508"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.25046\/aj050265"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/computers9040089"},{"key":"ref24","article-title":"Variational Autoencoder for Deep Learning of Images, Labels and Captions","author":"pu","year":"2016","journal-title":"NIPS"},{"key":"ref23","first-page":"3494","article-title":"An Optimized Convolutional Neural Network for Handwritten Digital Recognition Classification","volume":"98","author":"salameh","year":"2020","journal-title":"Journal of Theoretical and Applied Information Technology"},{"journal-title":"ADFA Linux data set (ADFA-LD) cyber security benchmark dataset","article-title":"School of Engineering and Information Technology, UNSW, Australia","year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.092"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.08.020"},{"key":"ref51","first-page":"235e","article-title":"Network traffic anomaly detection using PCA and BiGAN","author":"patil","year":"2020","journal-title":"Internet Technology Letters"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/s19091977"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/app9010178"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/info10110356"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314439"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2018.01.014"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899721"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907965"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC48688.2020.0-218"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3547"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57805-3_38"},{"key":"ref12","first-page":"97","article-title":"Signature-based multi-layer distributed intrusion detection system using mobile agents","volume":"15","author":"uddin","year":"2013","journal-title":"Int J Netw Secur"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3893"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(02)00037-3"},{"key":"ref16","first-page":"84","article-title":"Research on intrusion detection and response: a survey","volume":"1","author":"kabiri","year":"2005","journal-title":"Int J Netw Secur"},{"key":"ref17","first-page":"91","article-title":"A survey on comparative analysis of decision tree algorithms in data mining","volume":"3","author":"chary","year":"2017","journal-title":"International Journal of Advanced Scientific Technologies Engineering and Management Sciences"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2876","DOI":"10.3390\/s20102876","article-title":"Sensitivity Analysis for Predicting Sub-Micron Aerosol Concentrations Based on Meteorological Parameters","volume":"20","author":"zaidan","year":"2020","journal-title":"SENSORS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.08.003"},{"key":"ref4","volume":"13","author":"michie","year":"1994","journal-title":"Machine Learning Neural and Statistical Classification"},{"journal-title":"Computer Security Threat Monitoring and Surveillance","year":"1980","author":"anderson","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4396","DOI":"10.3390\/app9204396","article-title":"Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey","volume":"9","author":"liu","year":"2019","journal-title":"Appl Sci"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.133"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3031892"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"ref46","first-page":"4014e","article-title":"An integrated intrusion detection system using correlation-based attribute selection and artificial neural network","author":"thaseen","year":"2020","journal-title":"Trans Emerging Tel Tech"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972627"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/info11050279"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9060916"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sciaf.2020.e00497"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071120"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101695"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4705982"}],"event":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2021,12,21]]},"location":"Muscat, Oman","end":{"date-parts":[[2021,12,23]]}},"container-title":["2021 22nd International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9677036\/9677041\/09677375.pdf?arnumber=9677375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:57:49Z","timestamp":1652187469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9677375\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/acit53391.2021.9677375","relation":{},"subject":[],"published":{"date-parts":[[2021,12,21]]}}}