{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:47:23Z","timestamp":1770227243559,"version":"3.49.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T00:00:00Z","timestamp":1694822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,16]]},"DOI":"10.1109\/aibthings58340.2023.10292485","type":"proceedings-article","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:51:40Z","timestamp":1698691900000},"page":"1-5","source":"Crossref","is-referenced-by-count":10,"title":["Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Tosin","family":"Ige","sequence":"first","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,Texas,USA"}]},{"given":"Christopher","family":"Kiekintveld","sequence":"additional","affiliation":[{"name":"University of Texas at El Paso,Department of Computer Science,Texas,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICA52458.2021.9697244"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1693\/1\/012109"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence56041.2023.10048802"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICA52458.2021.9697244"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GlobConPT57482.2022.9938367"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.05.017"},{"key":"ref2","first-page":"1","article-title":"Investigating the Statistical Assumptions of Na&#x00EF;ve Bayes Classifiers","author":"kelly","year":"2021","journal-title":"2021 55th Annual Conference on Information Sciences and Systems (CISS) CISS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3171660"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.14569\/IJACSA.2022.0130502","article-title":"AI powered anti-cyber bullying system using machine learning algorithm of multinomial na&#x00EF;ve Bayes and optimized linear support vector machine","volume":"13","author":"ige","year":"2022","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09076-9_20"},{"key":"ref18","first-page":"10","article-title":"Data Mining in the Context of Legality, Privacy, and Ethics","volume":"10","author":"okomayin","year":"2023","journal-title":"International Journal of Research and Scientific Innovation (IJRSI)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AISP.2017.8324083"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEM.2019.8853721"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NIGERCON54645.2022.9803098"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEARS56392.2023.10085510"},{"key":"ref3","first-page":"18","article-title":"Variants of Na&#x00EF;ve Bayes Algorithm for Hate Speech Detection in Text Documents","author":"vijay","year":"2023","journal-title":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)"},{"key":"ref6","first-page":"1","article-title":"A Multinomial Na&#x00EF;ve Bayes Classifier for identifying Actors and Use Cases from Software Requirement Specification documents","author":"v","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTM.2019.8776800"}],"event":{"name":"2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","location":"Mount Pleasant, MI, USA","start":{"date-parts":[[2023,9,16]]},"end":{"date-parts":[[2023,9,17]]}},"container-title":["2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10292429\/10291015\/10292485.pdf?arnumber=10292485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:23:03Z","timestamp":1701112983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10292485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,16]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/aibthings58340.2023.10292485","relation":{},"subject":[],"published":{"date-parts":[[2023,9,16]]}}}