{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T06:10:17Z","timestamp":1738995017522,"version":"3.37.0"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:00:00Z","timestamp":1725667200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:00:00Z","timestamp":1725667200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,7]]},"DOI":"10.1109\/aibthings63359.2024.10863806","type":"proceedings-article","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T18:38:03Z","timestamp":1738953483000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Network Intrusion Detection System Using NDAE With Xgboost"],"prefix":"10.1109","author":[{"given":"Yakubu Joseph","family":"Itodo","sequence":"first","affiliation":[{"name":"University of Cincinnati,School of Information Technology,Cincinnati,USA"}]},{"given":"Isaac Kofi","family":"Nti","sequence":"additional","affiliation":[{"name":"University of Cincinnati,School of Information Technology,Cincinnati,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8266347"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3145002"},{"key":"ref4","article-title":"Network intrusion detection with edge-directed graph multi-head attention networks","author":"Li","year":"2023","journal-title":"arXiv"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1117\/12.2681723"},{"volume-title":"On the evaluation of sequential machine learning for network intrusion detection","year":"2021","author":"Andrea","key":"ref6"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/PRDC50213.2020.00018","volume-title":"Generative deep learning for internet of things network traffic generation","author":"Shahid","year":"2020"},{"issue":"2","key":"ref8","doi-asserted-by":"crossref","DOI":"10.24003\/emitter.v4i2.149","article-title":"Feature selection of network intrusion data using genetic algorithm and particle swarm optimization","volume":"4","author":"Syarif","year":"2016","journal-title":"Emitter International Journal of Engineering Technology"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/1583991.1584044","volume-title":"Field-split parallel architecture for high performance multi-match packet classification using fpgas","author":"Jiang","year":"2009"},{"issue":"6","key":"ref10","doi-asserted-by":"crossref","first-page":"52","DOI":"10.5815\/ijitcs.2015.06.07","article-title":"A new platform nids based on wema","volume":"7","author":"Hnaif","year":"2015","journal-title":"International Journal of Information Technology and Computer Science"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"69822","DOI":"10.1109\/ACCESS.2022.3187116","article-title":"Detecting zero-day intrusion attacks using semi-supervised machine learning approaches","volume":"10","author":"Mbona","year":"2022","journal-title":"IEEE Access"},{"issue":"3","key":"ref12","doi-asserted-by":"crossref","first-page":"270","DOI":"10.3390\/electronics8030270","article-title":"Two-phase pfac algorithm for multiple patterns matching on cuda gpus","volume":"8","author":"Lai","year":"2019","journal-title":"Electronics"},{"key":"ref13","first-page":"155","volume-title":"Characterizing the performance of network intrusion detection sensors","author":"Schaelicke","year":"2003"},{"volume-title":"Bringing to light: adversarial poisoning detection in multi-controller software-defined networks","year":"2023","author":"Das","key":"ref14"},{"key":"ref15","first-page":"187","volume-title":"Clort: high throughput and low energy network intrusion detection on iot devices with embedded gpus","author":"Stylianopoulos","year":"2018"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1145\/3359789.3359811","volume-title":"Co-evaluation of pattern matching algorithms on iot devices with embedded gpus","author":"Stylianopoulos","year":"2019"},{"issue":"12","key":"ref17","doi-asserted-by":"crossref","first-page":"155014771988990","DOI":"10.1177\/1550147719889906","article-title":"A critical review on security approaches to software-defined wireless sensor networking","volume":"15","author":"Saqib","year":"2019","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/3411495.3421359","article-title":"Tiki-taka","volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","author":"Zhang"},{"issue":"3","key":"ref19","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1080\/09720529.2014.932129","article-title":"An insight review on bloom filter and its variants with applications: an emerging hash-based membership querying technique","volume":"18","author":"Saravanan","year":"2015","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1145\/2413176.2413218","volume-title":"New opportunities for load balancing in network-wide intrusion detection systems","author":"Heorhiadi","year":"2012"},{"key":"ref21","first-page":"9","volume-title":"Snips: a software-defined approach for scaling intrusion prevention systems via offloading.","author":"Heorhiadi","year":"2014"},{"issue":"7","key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-021-3455-1","article-title":"Vulnergan: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems","volume":"65","author":"Liu","year":"2022","journal-title":"Science China Information Sciences"},{"volume-title":"Generating practical adversarial network traffic flows using nidsgan","year":"2022","author":"Zolbayar","key":"ref23"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.36227\/techrxiv.12480425.v2","volume-title":"Effects of feature selection and normalization on network intrusion detection","author":"Umar","year":"2023"},{"issue":"21","key":"ref25","doi-asserted-by":"crossref","first-page":"7016","DOI":"10.3390\/s21217016","article-title":"A deep learning-based intrusion detection system for mqtt enabled iot","volume":"21","author":"Khan","year":"2021","journal-title":"Sensors"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.procs.2015.04.189","article-title":"Hybrid intrusion detection system for private cloud: a systematic approach","volume":"48","author":"Rajendran","year":"2015","journal-title":"Procedia Computer Science"},{"key":"ref27","first-page":"124","volume-title":"Road context-aware intrusion detection system for autonomous cars.","author":"Jiang","year":"2020"},{"volume-title":"A study on intrusion detection based on data mining","year":"2010","author":"Song","key":"ref28"},{"issue":"3","key":"ref29","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1002\/qre.477","article-title":"Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection","volume":"18","author":"Li","year":"2002","journal-title":"Quality and Reliability Engineering International"},{"issue":"32","key":"ref30","doi-asserted-by":"crossref","first-page":"33","DOI":"10.55529\/jaimlnn.32.33.42","article-title":"An artificial neural network technique for prediction of cyber-attack using intrusion detection system","author":"Jain","year":"2023","journal-title":"Journal of Artificial Intelligence Machine Learning and Neural Network"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1109\/QSIC.2010.25","volume-title":"Specification-based testing of intrusion detection engines using logical expression testing criteria","author":"Massicotte","year":"2010"},{"issue":"7","key":"ref32","doi-asserted-by":"crossref","first-page":"6","DOI":"10.5120\/ijca2016908921","article-title":"Design and analysis of real-time network intrusion detection and prevention system using open-source tools","volume":"138","author":"Uddin","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1109\/ITNG.2007.80","article-title":"Dynamic two-layer signature-based ids with unequal databases","volume-title":"Fourth International Conference on Information Technology (ITNG\u201907)","author":"Salour"},{"issue":"1","key":"ref34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17972\/ijicta20184138","article-title":"Effectiveness of intrusion detection systems in high-speed networks","volume":"4","author":"Hu","year":"2018","journal-title":"International Journal of Information Communication Technology and Applications"},{"issue":"2","key":"ref35","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1587\/transcom.E93.B.389","article-title":"Implementing signature based ids in ip-based sensor networks with the help of signature-codes","volume":"E93-B","author":"Amin","year":"2010","journal-title":"IEICE Transactions on Communications"},{"issue":"3","key":"ref36","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1002\/sec.562","article-title":"Towards reducing false alarms in network intrusion detection systems with data summarization technique","volume":"6","author":"Hubballi","year":"2012","journal-title":"Security and Communication Networks"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"57542","DOI":"10.1109\/ACCESS.2021.3071263","article-title":"A review of rule learning-based intrusion detection systems and their prospects in smart grids","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"issue":"03","key":"ref38","doi-asserted-by":"crossref","first-page":"215","DOI":"10.4236\/jis.2012.33027","article-title":"Data stream subspace clustering for anomalous network packet detection","volume":"03","author":"Miller","year":"2012","journal-title":"Journal of Information Security"},{"issue":"5","key":"ref39","doi-asserted-by":"crossref","DOI":"10.14569\/IJACSA.2021.0120566","article-title":"A review on feature selection and ensemble techniques for intrusion detection system","volume":"12","author":"Torabi","year":"2021","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.4108\/eai.12-10-2019.2296332","article-title":"Implementation of cm-spade algorithm in building denial of service detection system model using snort","volume-title":"Proceedings of the Proceedings of the 7th Mathematics, Science, and Computer Science Education International Seminar, MSCEIS 20","author":"Nugroho"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/978-3-030-78811-7_44","article-title":"Intrusion detection system based on an updated ANN model","author":"Xue","year":"2021","journal-title":"Lecture Notes in Computer Science"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2016\/1075648","article-title":"Hybrid intrusion detection system for ddos attacks","author":"Cepheli","year":"2016","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"199482","DOI":"10.1109\/ACCESS.2020.3035250","article-title":"Epigenetic algorithm-based detection technique for network attacks","volume":"8","author":"Ezzarii","year":"2020","journal-title":"IEEE Access"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1109\/CBD.2014.41","volume-title":"An intrusion detection model based on deep belief networks","author":"Gao","year":"2014"},{"key":"ref45","first-page":"1","article-title":"Intrusion detection system based on genetic attribute reduction algorithm based on rough set and neural network","author":"Luo","year":"2022","journal-title":"Wireless Communications and Mobile Computing"},{"key":"ref46","first-page":"1","article-title":"Intrusion detection system based on genetic attribute reduction algorithm based on rough set and neural network","author":"Luo","year":"2022","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"1","key":"ref47","article-title":"A new intrusion detection and alarm correlation technology based on neural network","volume":"2019","author":"Zhu","year":"2019","journal-title":"Eurasip Journal on Wireless Communications and Networking"},{"issue":"7","key":"ref48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.35940\/ijese.F2530.0610722","article-title":"Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches","volume":"10","author":"Wanjau","year":"2022","journal-title":"In International Journal of Emerging Science and Engineering"},{"key":"ref49","article-title":"Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges (Version 2)","author":"Maseer","year":"2023","journal-title":"arXiv"},{"issue":"5","key":"ref50","first-page":"1125","article-title":"A systematic literature review for network intrusion detection system (IDS)","volume-title":"In International Journal of Information Security","volume":"22","author":"Abdulganiyu"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107764"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12092100"},{"key":"ref53","article-title":"UCI Machine Learning Repository","author":"Dua","year":"2017","journal-title":"University of California, Irvine, School of Information and Computer Sciences"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/tetci.2017.2772792"}],"event":{"name":"2024 IEEE 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)","start":{"date-parts":[[2024,9,7]]},"location":"Mt Pleasant, MI, USA","end":{"date-parts":[[2024,9,8]]}},"container-title":["2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10860733\/10861884\/10863806.pdf?arnumber=10863806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T05:37:45Z","timestamp":1738993065000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10863806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,7]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/aibthings63359.2024.10863806","relation":{},"subject":[],"published":{"date-parts":[[2024,9,7]]}}}