{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:25:18Z","timestamp":1730193918789,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,6]]},"DOI":"10.1109\/acit58888.2023.10453827","type":"proceedings-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:53:38Z","timestamp":1710788018000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing and contrasting machine learning algorithms for Intrusion Detection System"],"prefix":"10.1109","author":[{"given":"Shrouq","family":"Al-Daja","sequence":"first","affiliation":[{"name":"Zarqa University,Department of Data Science and Artificial Intelligence,Zarqa,Jordan"}]},{"family":"Ala'Alyabrodi","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Mohammad Rasmi","family":"Al-Mousa","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Abdullah","family":"Al-Qammaz","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Kholod Naser","family":"Olimat","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of English and Literature,Zarqa,Jordan"}]},{"given":"Hamza M","family":"Olemat","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Computer Science,Zarqa,Jordan"}]},{"given":"Mohammad Sh","family":"Daoud","sequence":"additional","affiliation":[{"name":"College of Engineering, Al Ain University,Abu Dhabi,United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity49315.2020.9138871"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3056614"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref7","first-page":"187","article-title":"Evaluating the CIC IDS2017 dataset using machine learning methods and creating multiple predictive models in the statistical computing language R","volume":"5","author":"Pelletier","year":"2020","journal-title":"Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009843"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1192\/1\/012018"},{"key":"ref10","first-page":"644","article-title":"MULTILEVEL AUTHENTICATION SYSTEM USING HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR ONLINE BANKING","volume":"15","author":"Uyyala","year":"2023","journal-title":"the International journal of analytical and experimental modal analysis"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/app12020852"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010173"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.35940\/ijrte.c4587.098319"},{"article-title":"Intrusion Detection Evaluation Dataset (CICIDS2017)","volume-title":"UNB","year":"2017","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIBT52874.2022.9807766"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45371-8_4"},{"key":"ref18","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"Guyon","year":"2003","journal-title":"Journal of machine learning research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/19\/3A\/10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3483207.3483232"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ceh.2020.11.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107840"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140516"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5267\/j.ijdns.2023.1.010"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT57182.2022.9994221"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18576\/jsap\/130110"}],"event":{"name":"2023 24th International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2023,12,6]]},"location":"Ajman, United Arab Emirates","end":{"date-parts":[[2023,12,8]]}},"container-title":["2023 24th International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10453649\/10453660\/10453827.pdf?arnumber=10453827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T17:24:50Z","timestamp":1713201890000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10453827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/acit58888.2023.10453827","relation":{},"subject":[],"published":{"date-parts":[[2023,12,6]]}}}